Unlimited WordPress themes, plugins & video downloads!

Research

Research – Microsoft_Windows_resolver_DNS_cache_poisoning.pdf

This paper shows that Windows DNS stub resolver queries are predictable – i.e. that the source UDP port and DNS transaction ID can be effectively predicted. A predictability algorithm is described that, in optimal conditions, provides very few guesses for the “next” query, thereby overcoming whatever protection offered by the transaction ID mechanism. This enables a much more effective DNS client poisoning than the currently known attacks against Windows DNS stub resolver.

 

You can download it from the following link: https://packetstormsecurity.com/files/download/65337/Microsoft_Windows_resolver_DNS_cache_poisoning.pdf

Source: https://packetstormsecurity.com/files/65337/Microsoft_Windows_resolver_DNS_cache_poisoning.pdf.html

Related posts
Research

Research - EUSecWest 2010 Call For Papers

Research

Research - ewdd.pdf

Research

Research - exploit.txt

Research

Research - Exploiting DLLs: A Guide To DLL Hijacking

Sign up for our Newsletter and
stay informed