On Fri, Jul 26, 2002 at 01:19:29PM +0300, Alexandru Balan wrote: > i asked the guy for the exploit, ran it. and it seems to fork in > background and afterwards it starts flooding with UDP packets > 161.69.3.150 ;P not nice, not nice at all Oh, right! From Feb, 2001. There was a "bind 8 exploit" that was really a trojan that pounded what was then dns1.nai.com. http://online.securityfocus.com/archive/1/159930/2001-01-30/2001-02-05/1 ---------------------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
This archive was generated by hypermail 2b30 : Fri Jul 26 2002 - 10:29:54 PDT