National Cyber Warfare Foundation (NCWF)


Warning: Undefined array key "PeopleID" in /var/www/html/includes/libUser.php on line 492

DNS Posioning and Spoofing Made Simpler with BIND Vulnerability


0 user ratings
2026-02-06 11:51:07
milo
Blue Team (CND)
Web page spoofing just got easier: One of the defenses against Domain Name System (DNS) cache poisoning and web address spoofing lies in the randomization of the IP address of the queried name server. But a newly found vulnerability in BIND, the most widely used DNS software on the internet, enables an attacker to de-randomize the queries—greatly reducing the time and effort required to successfully poison BIND's cache.

DNS Posioning and Spoofing Made Simpler with BIND Vulnerability
https://www.infosecurity-magazine.com/news/dns-posioning-and-spoofing-made-simpler-with-bind/
Web page spoofing just got easier: One of the defenses against Domain Name System (DNS) cache poisoning and web address spoofing lies in the randomization of the IP address of the queried name server. But a newly found vulnerability in BIND, the most widely used DNS software on the internet, enables an attacker to de-randomize the queries—greatly reducing the time and effort required to successfully poison BIND's cache.
Wed, 14 Aug 2013 20:14:00 GMT
https://www.infosecurity-magazine.com/news/dns-posioning-and-spoofing-made-simpler-with-bind/

Source: InfosecMagazine
Source Link: https://www.infosecurity-magazine.com/news/dns-posioning-and-spoofing-made-simpler-with-bind/


Comments
new comment
Nobody has commented yet. Will you be the first?
 
Forum
Blue Team (CND)



Copyright 2012 through 2026 - National Cyber Warfare Foundation - All rights reserved worldwide.