-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

What are some of the different ways NameServers are compromised?

There are many levels of scanning from simple reverse lookups to nmap,
I have not seen anything in terms of
some way of scanning for virtually hosted/name based sites (on a simple
IP).

This is asked as there are a lot of name based sites and if there is a
way of finding out what domains are on a
single server, you have an easier entry into a server then say if you
were trying to go in as root/admin on a
server.

This is also curiousity based on  something I read "Strategic Scanning
and Assessment of Remote Hosts"
http://www.attrition.org/security/newbie/pen/ssarh.html

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com>

iQA/AwUBO6jswzCZS5+z8VAfEQJlkQCgojBlJURPDdfFbdI2xmidOUdl7roAn0Nm
a51pheGSLw53PAAwhWnApNxM
=f9n+
-----END PGP SIGNATURE-----


Reply via email to