Full Disclosure mailing list archives
Tool release: [evilgrade] - Using DNS cache poisoning to exploit poor update implementations
From: "[ISR] - Infobyte Security Research" <noreply () infobyte com ar>
Date: Mon, 28 Jul 2008 07:19:54 -0300
-- ISR - Infobyte Security Research -- | ISR-evilgrade | www.infobyte.com.ar | ISR-evilgrade: is a modular framework that allow us to take advantage of poor upgrade implementations by injecting fake updates. * How does it work? It works with modules, each module implements the structure needed to emulate a false update of specific applications/systems. Evilgrade needs the manipulation of the victim dns traffic. Attack vectors: --------------------- Internal scenary: (Internal DNS access,ARP spoofing,DNS Cache Poisoning, DHCP spoofing) External scenary: (Internal DNS access,DNS Cache Poisoning) * What are the supported OS? The framework is multiplaform, it only depends of having the right payload for the target platform to be exploited. Implemented modules: --------------------------------- - Java plugin - Winzip - Winamp - MacOS - OpenOffices - iTunes - Linkedin Toolbar - DAP [Download Accelerator] - notepad++ - speedbit ..:: DEMO Demo feature - (Java plugin + Dan Kaminsky´s Dns vulnerability) = remote pwned. http://www.infobyte.com.ar/demo/evilgrade.htm ..:: AUTHOR Francisco Amato famato+at+infobyte+dot+com+dot+ar ..:: DOWNLOAD http://www.infobyte.com.ar/developments.html ..:: MORE INFORMATION Presentation: http://www.infobyte.com.ar/down/Francisco-Amato-evilgrade-ENG.html _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Tool release: [evilgrade] - Using DNS cache poisoning to exploit poor update implementations [ISR] - Infobyte Security Research (Jul 28)