|
Full Disclosure
mailing list archives
Re: DNS Pointer - DoS Exploit
From: Srinivas Naik <naik.srinu () gmail com>
Date: Sat, 4 Dec 2010 12:12:42 +0530
Thanks for the input Mr. Weimer
I am planning to trigger this exploit and wandering how to construct such a
packet.
Ultimate goal is to make a client request which can cause this effect. If
possible, scripting ideas would be helpful.
Cheers,
Naik
On Fri, Dec 3, 2010 at 10:22 PM, Florian Weimer <fweimer () bfk de> wrote:
* Srinivas Naik:
A DNS packet with a pointer loop is a protocol anomaly which some
programs
may not handle gracefully.
Try this:
00 00 00 00 00 01 00 00 00 00 00 00 C0 0C
--
Florian Weimer <fweimer () bfk de>
BFK edv-consulting GmbH http://www.bfk.de/
Kriegsstraße 100 tel: +49-721-96201-1
D-76133 Karlsruhe fax: +49-721-96201-99
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
By Date
By Thread
Current thread:
|