-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
What are some of the different ways NameServers are compromised?
There are many levels of scanning from simple reverse lookups to nmap,
I have not seen anything in terms of
some way of scanning for virtually hosted/name based sites (on a simple
IP).
This is asked as there are a lot of name based sites and if there is a
way of finding out what domains are on a
single server, you have an easier entry into a server then say if you
were trying to go in as root/admin on a
server.
This is also curiousity based on something I read "Strategic Scanning
and Assessment of Remote Hosts"
http://www.attrition.org/security/newbie/pen/ssarh.html
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com>
iQA/AwUBO6jswzCZS5+z8VAfEQJlkQCgojBlJURPDdfFbdI2xmidOUdl7roAn0Nm
a51pheGSLw53PAAwhWnApNxM
=f9n+
-----END PGP SIGNATURE-----