<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Hack &#8211; Blogvaria</title>
	<atom:link href="https://blog.evaria.com/key/hack/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.evaria.com</link>
	<description>The personal pages</description>
	<lastBuildDate>Mon, 11 Aug 2008 10:47:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
<site xmlns="com-wordpress:feed-additions:1">1077093</site>	<item>
		<title>The DNS Patch is Hacked</title>
		<link>https://blog.evaria.com/2008/the-dns-patch-is-hacked/</link>
		
		<dc:creator><![CDATA[Thomas]]></dc:creator>
		<pubDate>Mon, 11 Aug 2008 10:47:47 +0000</pubDate>
				<category><![CDATA[Internet stuff]]></category>
		<category><![CDATA[Tech news]]></category>
		<category><![CDATA[DNS]]></category>
		<category><![CDATA[Hack]]></category>
		<category><![CDATA[Patch]]></category>
		<guid isPermaLink="false">http://blog.evaria.com/?p=930</guid>

					<description><![CDATA[A (bored) Russian physicist has successfully hacked an emergency patch designed to fix a recently discovered DNS vulnerability. Evgeniy Polyakov reportedly used two desktop computers and a high-speed network link &#8230; ]]></description>
										<content:encoded><![CDATA[<p>A (bored) Russian physicist has successfully hacked an emergency patch designed to fix a <a href="http://www.vnunet.com/vnunet/news/2222249/dns-flaw-revealed" target="_blank">recently discovered DNS vulnerability</a>.</p>
<p>Evgeniy Polyakov reportedly used two desktop computers and a high-speed network link to fool the patch into returning a spoofed address in just 10 hours.</p>
<p>According to Polyakov, a typical attack server generates approximately 40,000-50,000 fake replies before hitting on the right one. Polyakov also noted that if the port is matched &#8220;the probability of successful poisoning is more than 60 per cent&#8221;.</p>
<p>Alarmed insecurity experts warned the patch could be exploited to redirect Internet traffic and collect user passwords.</p>
<p>The hacker <a href="http://tservice.net.ru/~s0mbre/blog/devel/networking/dns/2008_08_08.html" target="_blank">appears to state on a Russian Blog</a>, &#8220;DJBDNS does not suffer from this attack. It does. Everyone does. With some tweaks it can take longer than BIND, but overall problem is there.&#8221;</p>
<p>Read the full story at <a href="http://www.nytimes.com/2008/08/09/technology/09flaw.html" target="_blank">New York Times</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">930</post-id>	</item>
	</channel>
</rss>
