FromTheRafters wrote:
> > I'm surprised I have to inform this concept to the readers of this
> > group.
>
> you make it sound like it's a new thing.
How so?
I was not implying that it is a new thing.
> > I was wondering why, in this case of operating a white-hat DNS
> > server for the benefit of thousands or hundreds of thousands of
> > trojanized PC's, that this technique of injecting a banner-ad
> > wasn't being done.
>
> I think it's because it isn't being done by the DNS server,
When-ever or where-ever it's done, the DNS server has to be involved for
the method to work. Whether or not the DNS server is also used as the
surrogate web server used to inject the ad-content is just an academic
question.
If you want ad-content to be injected, and if you already are operating
a "rogue" DNS server (either black or white hat) that is being used by
some population of comprimized PC's, then you have the ability to inject
the ads just by altering the software on your DNS server.
> Perhaps the authorities would have to 'take over' the ISPs *not*
> the DNS servers in order to do as you suggest?
No.
This issue pertains to a population of trojanized PC's or routers with
altered DNS settings. The PC's or routers have their DNS settings
pointing to a malicious server or servers (by way of a malicious IP
address I would guess).
Now someone somewhere (law enforcement) has granted a white-hat the
ability to route that DNS traffic away from the malicious IP address and
instead to his own server. I'm saying go the extra step and have that
server generate a banner ad telling the fools with comprimized systems
that they need to have their PC or router looked at and decontaminated.
The ISP's of those comprimized systems play no role in any of this.


Reply With Quote