funsec mailing list archives

Re: An example of DNS forensics


From: Daniel Uriah Clemens <superman () packetninjas org>
Date: Thu, 27 Oct 2005 17:51:21 +0000

+++ Richard M. Smith [26/10/05 10:29 -0400]:
->http://www.nytimes.com/2005/10/26/technology/26google.html?pagewanted=print
-> 
->Google Found to Be Testing Classified Ads 
->
->By JOHN MARKOFF 
->
->SAN FRANCISCO, Oct. 25 - An online classified service being tested by Google
->set off intense speculation on Tuesday after a Web site for the service was
->accidentally made public and discovered by a computer programmer on Monday.
->
->The service, which was named Google Base and was for a time accessible at
->base.google.com, described itself as "Google's database into which you can
->add all types of content."
->

I guess this is a good find, or simply a bad security practice made by google.

->
->The Google Base page was discovered on Monday by Tony Ruscoe, a British
->programmer, who said he had created an automatic program to search for
->subdomains accessible at the Google.com Web site. The company, based in
->Mountain View, Calif., took down the test site and replaced the page with a
->"403" forbidden-access response.
->

I guess the author being John Markoff kindoff hits a few trigger points.
Its just like John to over sexualize the use of a dns scanner.

Just one off the top of my head - 
http://packetstormsecurity.org/UNIX/scanners/blindcrawl.pl


-- 
-Daniel Uriah Clemens

Esse quam videra
                (to be, rather than to appear)
                     -Moments of Sorrow are Moments of Sobriety
                      { o)2059686335             c)2055676850 }
{Fingerprint C5B8 DB37 CC77 3C2B 0027  D2A6 D766 1F0E FE27 ADC8 }
 

Attachment: _bin
Description:

_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

Current thread: