Skip to Content.
Sympa Menu

discuss - Re: [opennic-discuss] SQL Injection on a .free domain

discuss AT lists.opennicproject.org

Subject: Discuss mailing list

List archive

Re: [opennic-discuss] SQL Injection on a .free domain


Chronological Thread 
  • From: Larry Brower <larry AT maxqe.com>
  • To: discuss AT lists.opennicproject.org
  • Subject: Re: [opennic-discuss] SQL Injection on a .free domain
  • Date: Sun, 06 May 2012 17:47:35 -0500
  • Openpgp: id=564C4A09

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

On 05/06/2012 05:40 PM, Brian Koontz wrote:
> On Sun, May 06, 2012 at 09:22:02PM +0100, Peter Green wrote:
>> Maybe I shouldn't be but I am surprised to see an SQL Injection
>> Attack from what I see is a Japanese I.P. address (150.70.64.195) on
>> one of my .free domains today.
>
> An ironic moment: OpenNIC is apparently mainstream enough now to
> warrant some script kiddie's time.
>
> We are now the DNS equivalent of OS X [1]...
>
> --Brian
>
> [1] http://apple.slashdot.org/story/12/05/05/017244/
>


It could also just be an automated attack from a compromised host who
has access to resolve .free domains perhaps.



- --


Larry Brower, CCNA

Fedora Ambassador - North America
Fedora Quality Assurance
lbrower AT fedoraproject.org
http://www.fedoraproject.org/
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJPpv+HAAoJEF1Xw4ZWTEoJNJcQAJvWPE6l7uDcFbb/Yca43xAV
nxN7rTy85BVj/VaLNKGw5ZAt+e7evtoBWzjgOicCJnKXmTjRv5zhuh3Z3EBNYsDQ
+sAvNZHhFbb883zXw7nYT1AUKXD3nJ/xbLjAuI4GsSEByiiDFavQmRijWBlddv9X
dVcgxVhrEwEQ1bbHbOJK0rSiUAMUZBOMA7ZSI1ZLw+eaD4A4mEqP5RRzM6Q7oO9g
Vg7QyTnEPV1sz8T4bc9+NDhpKjFynUSTI/LypdE+oWfHsu9mXJaPcnnxSYYmJQz4
RNKhy2UgiKt3bjaNGjN/6dAPI7yNOxVoNvRlIjOR6X5SgutNDPSKx2A2BvgSnUZX
S3QWxFsqn56sideFPSu1VLgSGYHipINx0PVkbiQfpgWslgP+9+5oeydq0WQE0RNT
WgHnIjd5p2c4fh5xtahIwAQuM/8gv8s0w3PpWUOrQMVYrrAZetHryjUxuoBRGpYM
v1xzGs7bpnVviLwue/u4uFZQMX5EkKxofLjeY1mpNDjwYsRVjQvihVmZJM4UYyWc
zpm9AmspWSiRG5DNiZ4gBWlXLBoGge4AOzmEw+lWwRtKQxmaWwEMxzHi2+9oS4IP
O/vdEiJChO8rCwdOLjLa4qy7SaFkPrimREaQd18oDFM+CMDj7CgGBJ6q7C6V6mBS
+6P5obgAZ5uQ8LutGyVc
=R2qf
-----END PGP SIGNATURE-----



Archive powered by MHonArc 2.6.19.

Top of Page