Quoting Chris Buxton <[EMAIL PROTECTED]>: > That sure seems like a lot of work when you could just: > > dig porttest.dns-oarc.net txt +short @server-ip > > For example: > > $ dig porttest.dns-oarc.net txt +short @217.151.171.7 > z.y.x.w.v.u.t.s.r.q.p.o.n.m.l.k.j.i.h.g.f.e.d.c.b.a.pt.dns-oarc.net. > "217.151.171.7 is GOOD: 26 queries in 3.9 seconds from 26 ports with > std dev 19886.66" > > Notice the word "GOOD" in the output. Also notice the standard > deviation shown at the end - you want 5 digits before the decimal point. > > Chris Buxton > Professional Services > Men & Mice > > On Jul 25, 2008, at 10:24 PM, Brian Keefer wrote: > >> On Jul 25, 2008, at 5:48 PM, Gregory Hicks wrote: >> >>>> Date: Fri, 25 Jul 2008 20:36:50 -0400 >>>> From: [EMAIL PROTECTED] >>>> To: "[email protected]" >>> <[email protected]> >>>> Subject: dns exploit >>>> >>>> Silly question, how do I tell If Im vulnerable to the dns exploit? >>>
All is well. Thanks for the info. -- Dwayne Hottinger Network Administrator Harrisonburg City Public Schools "Everything should be made as simple as possible, but not simpler." -- Albert Einstein
