[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-Disclosure] Possible DNS compromise/poisoning?
- To: full-disclosure@xxxxxxxxxxxxxxxx
- Subject: Re: [Full-Disclosure] Possible DNS compromise/poisoning?
- From: DanBUK <danbuk@xxxxxxxxx>
- Date: Wed, 05 Jan 2005 18:29:10 +0000
I see the same, but I don't think there is an issue.
C:\WINDOWS>nslookup
Default Server: pmsidc03.pmsi.local
Address: 192.168.42.13
> set type=cname
> www.microsoft.com
Server: pmsidc03.pmsi.local
Address: 192.168.42.13
Non-authoritative answer:
www.microsoft.com canonical name = www.microsoft.com.nsatc.net
> set type=a
> www.microsoft.com
Server: pmsidc03.pmsi.local
Address: 192.168.42.13
Non-authoritative answer:
Name: www.microsoft.com.nsatc.net
Addresses: 207.46.156.252, 207.46.244.188, 207.46.245.156, 207.46.249.252
207.46.250.252, 207.46.144.222, 207.46.156.156, 207.46.156.220
Aliases: www.microsoft.com
Cheers,
DanBUK.
DanB UK
London, UK.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html