Several email providers are banned due to spam. Gmail is recommended.

Send email change requests and registration issues to: testers.staff@gmail.com

Results 1 to 1 of 1

Thread: Sad dns

  1. #1
    Moderator
    Join Date
    Jan 2014
    Posts
    997
    Post Thanks / Like

    Sad dns

    SAD DNS is a revival of the classic DNS cache poisoning attack
    (which no longer works since 2008) leveraging novel network side channels that exist in all modern operating systems, including Linux, Windows, macOS, and FreeBSD. This represents an important milestone --- the first weaponizable network side channel attack that has serious security impacts. The attack allows an off-path attacker to inject a malicious DNS record into a DNS cache (e.g., in BIND, Unbound, dnsmasq).

    DNS is a universal protocol on the Internet, which translates the human-readable domain names into computer-readable IP addresses. Almost every networking application relies on it. More specifically, SAD DNS attack allows an attacker to redirect any traffic (originally destined to a specific domain) to his own server and then become a man-in-the-middle (MITM) attacker, allowing eavesdropping and tampering of the communication.

    You can check your status here
    /https://www.saddns.net/

    Last edited by damien; 1 Week Ago at 09:52 PM.
    I do not test
    I will not post sekret info.
    pay attention and all is yours.

    Donate : BTC 1M3YjFPmRvqGyYgNYMR4H6C7FwkkKDrRNy
    Support the TOR Project Start a Relay today.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •