Virus Guy wrote:
> FromTheRafters wrote:
>
>>> I'm surprised I have to inform this concept to the readers of this
>>> group.
>>
>> you make it sound like it's a new thing.
>
> How so?
>
> I was not implying that it is a new thing.
Yes, you only implied that we didn't already know. This has been
happening for quite a while.
>>> I was wondering why, in this case of operating a white-hat DNS
>>> server for the benefit of thousands or hundreds of thousands of
>>> trojanized PC's, that this technique of injecting a banner-ad
>>> wasn't being done.
Because in the scenario where it was being done - the ISP is involved in
hijacking the DNS response and supplying their own special page.
>> I think it's because it isn't being done by the DNS server,
>
> When-ever or where-ever it's done, the DNS server has to be involved for
> the method to work.
How so? That is, beyond the fact that a response has to exist for it to
be hijacked.
> Whether or not the DNS server is also used as the
> surrogate web server used to inject the ad-content is just an academic
> question.
The DNS server either supplies an address or it doesn't.
> If you want ad-content to be injected, and if you already are operating
> a "rogue" DNS server (either black or white hat) that is being used by
> some population of comprimized PC's, then you have the ability to inject
> the ads just by altering the software on your DNS server.
How does one do this?
>> Perhaps the authorities would have to 'take over' the ISPs *not*
>> the DNS servers in order to do as you suggest?
>
> No.
>
> This issue pertains to a population of trojanized PC's or routers with
> altered DNS settings. The PC's or routers have their DNS settings
> pointing to a malicious server or servers (by way of a malicious IP
> address I would guess).
Yes, and these can return whatever results they want to. What will the
client software do when they expect a numerical address or an error
response and they get some HTML instead?
> Now someone somewhere (law enforcement) has granted a white-hat the
> ability to route that DNS traffic away from the malicious IP address and
> instead to his own server. I'm saying go the extra step and have that
> server generate a banner ad telling the fools with comprimized systems
> that they need to have their PC or router looked at and decontaminated.
The DNS server is supposed to deliver HTML?
> The ISP's of those comprimized systems play no role in any of this.
Indeed, but the article you linked to did. They mucked with the response
from the DNS - not the DNS itself.


Reply With Quote
