surely the tool is not focused at a dns operator/admin audience..
On Tue, Jul 8, 2008 at 8:20 PM, Owen DeLong <[EMAIL PROTECTED]> wrote: > The tool, unfortunately, only goes after the server it thinks you are using > to > recurse from the client where you're running your browser. > > This makes it hard to test servers being used in production environments > without GUIs. The tool is not Lynx compatible. > > Owen > > > On Jul 8, 2008, at 5:12 PM, Lynda wrote: > > This is also being covered over on the Defcon Forums. Jeff Moss has said >> that he'll post the link to the interview that Kaminsky is doing right now, >> after it's over. Here's the link to the Forum discussion: >> >> https://forum.defcon.org/showthread.php?t=9547 >> >> The forum link also has a link to Dan's tool, where you can see if your >> DNS server is vulnerable. >> >> -- >> In April 1951, Galaxy published C.M. Kornbluth's "The Marching Morons". >> The intervening years have proven Kornbluth right. >> --Valdis Kletnieks >> > > > -- ^christian$