In early 2008, security researcher Dan Kaminsky, Director of penetration testing at IOActive stumbled across a potentially devastating flaw in the Domain Name System (DNS) code that the Internet relies on. The vulnerability – a flaw that could allow DNS cache poisoning, man-in-the-middle attacks, and e-mail hijacking – makes it easier, than previously known DNS vulnerabilities, for hackers to change the source IP addresses that domain names are routed to. Realizing the magnitude of the flaw, Kaminsky enlisted the maintainers of Berkeley Internet Name Domain (BIND), Internet Systems Consortium (ISC) to help him convince vendors that they had to work together to both keep the vulnerability quiet and patch their software immediately.
DNS Vulnerability Is Scary Stuff
Get Access
Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.