字體:小 中 大 | |
|
|
2008/07/24 21:42:01瀏覽1043|回應0|推薦3 | |
This is a very serious problem if this domain naming services been use by hacker as a tool to attack! Attack code released for new DNS attack By Robert McMillan , IDG News Service , 07/24/2008 The attack code was released Wednesday by developers of the Metasploit hacking toolkit. Internet security experts warn that this code may give criminals a way to launch virtually undetectable phishing attacks against Internet users whose service providers have not installed the latest DNS server patches. Attackers could also use the code to silently redirect users to fake software update servers in order to install malicious software on their computers, said Zulfikar Ramizan, a technical director with security vendor Symantec. "What makes this whole thing really scary is that from an end-user perspective they may not notice anything," he said. Related Content The attack is a variation on what's known as a cache poisoning attack. It has to do with the way DNS clients and servers obtain information from other DNS servers on the Internet. When the DNS software does not know the numerical IP address of a computer, it asks another DNS server for this information. With cache poisoning, the attacker tricks the DNS software into believing that legitimate domains, such as idg.com, map to malicious IP addresses. In Kaminsky's attack a cache poisoning attempt also includes what is known as "Additional Resource Record" data. By adding this data, the attack becomes much more powerful, security experts say. An attacker could launch such an attack against an ISP's domain name servers and then redirect them to malicious servers. By poisoning the domain name record for www.citibank.com, for example, the attackers could redirect the ISP's users to a malicious phishing server every time they tried to visit the banking site with their Web browser. On Monday, security company Matasano accidentally posted details of the flaw on its Web site. Matasano quickly removed the post and apologized for its mistake, but it was too late. Details of the flaw soon spread around the Internet. Although a software fix is now available for most users of DNS software, it can take time for these updates to work their way through the testing process and actually get installed on the network. "Most people have not patched yet," said ISC President Paul Vixie in an e-mail interview earlier this week. "That's a gigantic problem for the world." (Compare Patch and Vulnerability Management products) Metasploit's code looks "very real," and uses techniques that were not previously documented said Amit Klein, chief technology officer with Trusteer. Related Content |
|
( 休閒生活|網路生活 ) |