You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
"description": "This exploit attacks a fairly ubiquitous flaw in DNS implementations which\n Dan Kaminsky found and disclosed ~Jul 2008. This exploit replaces the target\n domains nameserver entries in a vulnerable DNS cache server. This attack works\n by sending random hostname queries to the target DNS server coupled with spoofed\n replies to those queries from the authoritative nameservers for that domain.\n Eventually, a guessed ID will match, the spoofed packet will get accepted, and\n the nameserver entries for the target domain will be replaced by the server\n specified in the NEWDNS option of this exploit.",
55725
+
"description": "This exploit attacks a fairly ubiquitous flaw in DNS implementations which\n Dan Kaminsky found and disclosed ~Jul 2008. This exploit replaces the target\n domains nameserver entries in a vulnerable DNS cache server. This attack works\n by sending random hostname queries to the target DNS server coupled with spoofed\n replies to those queries from the authoritative nameservers for that domain.\n Eventually, a guessed ID will match, the spoofed packet will get accepted, and\n the nameserver entries for the target domain will be replaced by the server\n specified in the NEWDNS option of this exploit.",
"description": "This exploit attacks a fairly ubiquitous flaw in DNS implementations which\n Dan Kaminsky found and disclosed ~Jul 2008. This exploit caches a single\n malicious host entry into the target nameserver by sending random hostname\n queries to the target DNS server coupled with spoofed replies to those\n queries from the authoritative nameservers for that domain. Eventually, a\n guessed ID will match, the spoofed packet will get accepted, and due to the\n additional hostname entry being within bailiwick constraints of the original\n request the malicious host entry will get cached.",
55769
+
"description": "This exploit attacks a fairly ubiquitous flaw in DNS implementations which\n Dan Kaminsky found and disclosed ~Jul 2008. This exploit caches a single\n malicious host entry into the target nameserver by sending random hostname\n queries to the target DNS server coupled with spoofed replies to those\n queries from the authoritative nameservers for that domain. Eventually, a\n guessed ID will match, the spoofed packet will get accepted, and due to the\n additional hostname entry being within bailiwick constraints of the original\n request the malicious host entry will get cached.",
"description": "This module can be used to determine differences\n in the cache entries between two DNS servers. This is\n primarily useful for detecting cache poisoning attacks,\n but can also be used to detect geo-location load balancing.",
55812
+
"description": "This module can be used to determine differences\n in the cache entries between two DNS servers. This is\n primarily useful for detecting cache poisoning attacks,\n but can also be used to detect geo-location load balancing.",
"description": "This module forges NetBIOS Name Service (NBNS) responses. It will listen for NBNS requests\n sent to the local subnet's broadcast address and spoof a response, redirecting the querying\n machine to an IP of the attacker's choosing. Combined with auxiliary/server/capture/smb or\n auxiliary/server/capture/http_ntlm it is a highly effective means of collecting crackable hashes on\n common networks.\n\n This module must be run as root and will bind to udp/137 on all interfaces.",
55983
+
"description": "This module forges NetBIOS Name Service (NBNS) responses. It will listen for NBNS requests\n sent to the local subnet's broadcast address and spoof a response, redirecting the querying\n machine to an IP of the attacker's choosing. Combined with auxiliary/server/capture/smb or\n auxiliary/server/capture/http_ntlm it is a highly effective means of collecting crackable\n hashes on common networks.\n\n This module must be run as root and will bind to udp/137 on all interfaces.",
0 commit comments