Today ,I see on the youkuaiyun.com ,a new article about the 'dns inject code ' abstract me.I follow it ,and I find the injection code in http://metasploit.com/dev/trac/browser/framework3/trunk/modules/auxiliary/spoof/dns/baliwicked_host.rb?rev=5579
So I think our network information center must have some solution to this hole , otherwise our website's username and password is oberviously become useless ,the hack will use this code to poison the dns server ,then direct we to an fake website have the same UI ,then we input the username and password ,the hacker will cat it .Although the code line is just for 332,bu the nic department must very recognition this event.
本文讨论了一种名为'dnsinjectcode'的DNS注入攻击手段,并分析了其潜在危害。作者通过跟踪发现该注入代码位于Metasploit项目的某一模块中,警示网络信息中心必须采取措施应对这一漏洞,以防网站用户名及密码被恶意窃取。
1120

被折叠的 条评论
为什么被折叠?



