984:"We worked with vendors on a coordinated patch," said Kaminsky, noting this is the first time such a coordinated multi-vendor synchronized patch release has ever been carried out. Microsoft, Sun, ISC's DNS Bind, and Cisco have readied DNS patches, said Kamisnky. "The patch was selected to be as non-disruptive as possible." ... Lack of an applied patch in the ISP infrastructure would mean "they could go after your ISP or Google and re-direct them pretty much wherever they wanted." Both current and older versions of DNS may be vulnerable, Kaminsky says, and patches may not be available for older DNS software. He says Yahoo was vulnerable because it uses an older version of BIND but had committed to upgrading to BIND 9.0.
501:
42:
399:, author of djbdns, had reported this as early as 1999. djbdns dealt with the issue using Source Port Randomization, in which the UDP port was used as a second transaction identifier, thus raising the possible ID count into the billions. Other more popular name server implementations left the issue unresolved due to concerns about performance and stability, as many operating system kernels simply weren't designed to cycle through thousands of
264:
566:, saying "what is the policy of the United States right now? Is it to make things more secure or to make them less secure?" In a 2016 interview, Kaminsky said, "the Internet was never designed to be secure. The Internet was designed to move pictures of cats ... We didn’t think you’d be moving trillions of dollars onto this. What are we going to do? And here’s the answer: Some of us got to go out and fix it."
531:, Mr. Kaminsky stood out for his empathy." He was known for regularly paying for hotels or travel bills for other people going to Black Hat, and once paid for a plane ticket for a friend of his after she had broken up with her boyfriend; the pair later married. At various points in his career, Kaminsky shifted his focus to work on projects related to his friends' and family's health, developing an app that helps
475:
On July 28, 2009, Kaminsky, along with several other high-profile security consultants, experienced the publication of their personal email and server data by hackers associated with the "Zero for 0wned" online magazine. The attack appeared to be designed to coincide with
Kaminsky's appearance at the
411:
not only include information for itself, but for the target as well. By using many "sibling" names in a row, he could induce a DNS server to make many requests at once. This tactic provided enough opportunities to guess the transaction ID to successfully spoof a reply in a reasonable amount of time.
364:
were not vulnerable). With most
Internet-based applications depending on DNS to locate their peers, a wide range of attacks became feasible, including website impersonation, email interception, and authentication bypass via the "Forgot My Password" feature on many popular websites. After discovering
279:
was found to be covertly installing anti-piracy software onto PCs, Kaminsky used DNS cache snooping to discover whether servers had recently contacted any of the domains accessed by the Sony rootkit. He used this technique to estimate that there were at least 568,000 networks that had computers with
230:
to publicize the fact that an 11-year-old could break military computer security. Instead, a three-day
Internet "timeout" for Kaminsky was negotiated. In 2008, after Kaminsky found and coordinated a fix for a fundamental DNS flaw, he was approached by the administrator, who thanked him and asked to
410:
Kaminsky's attack bypassed this TTL defense by targeting "sibling" names like "83.example.com" instead of "www.example.com" directly. Because the name was unique, it had no entry in the cache, and thus no TTL. But because the name was a sibling, the transaction-ID guessing spoofed response could
391:
Kaminsky received a substantial amount of mainstream press after disclosing this vulnerability, but experienced some backlash from the computer security community for not immediately disclosing his attack. When a reporter asked him why he had not used the DNS flaw for his own financial benefit,
288:
In April 2008, Kaminsky realized a growing practice among ISPs potentially represented a security vulnerability. Various ISPs have experimented with intercepting return messages of non-existent domain names and replacing them with advertising content. This could allow hackers to set up
414:
To fix this issue, all major DNS servers implemented Source Port
Randomization, as djbdns and PowerDNS had done before. This fix makes the attack up to 65,536 times harder. An attacker willing to send billions of packets can still corrupt names.
383:
Kaminsky had intended not to publicize details of the attack until 30 days after the release of the patch, but details were leaked on July 21, 2008. The information was quickly pulled down, but not before it had been
997:
467:
in one of their root certificates and errors in the certificate parsers in a number of Web browsers that allow attackers to successfully request certificates for sites they do not control.
1027:
224:
to intrude into military computers, and that the family's
Internet would be cut off. His mother responded by saying if their access was cut, she would take out an advertisement in the
220:
computer at age four, Kaminsky had taught himself to code by age five. At 11, his mother received a call from a government security administrator who told her that
Kaminsky had used
293:
schemes by attacking the server responsible for the advertisements and linking to non-existent subdomains of the targeted websites. Kaminsky demonstrated this process by setting up
1705:
The cybersecurity world woke up
Saturday to news of the sudden passing of Dan Kaminsky, a celebrated hacker who is widely credited with pioneering research work on DNS security.
887:
1452:
431:-infected hosts have a detectable signature when scanned remotely. Signature updates for a number of network scanning applications are now available, including
548:
395:
The actual vulnerability was related to DNS only having 65,536 possible transaction IDs, a number small enough to simply guess given enough opportunities.
961:
1671:
419:, which Kaminsky spoke in favor of, has since been widely (but not universally) deployed, bringing cryptographic assurance to results provided by DNS.
1005:
369:, who described the severity of the issue as meaning "everything in the digital universe was going to have to get patched." Kaminsky then alerted the
1907:
1366:
153:
researcher. He was a co-founder and chief scientist of Human
Security (formerly White Ops), a computer security company. He previously worked for
573:
at his home in San
Francisco. He had been frequently hospitalized for the disease in prior years. After his death, he received tributes from the
380:
Kaminsky worked with DNS vendors in secret to develop a patch to make exploiting the vulnerability more difficult, releasing it on July 8, 2008.
802:
656:
1057:
1035:
920:
1821:
1882:
310:
752:
897:
280:
the rootkit. Kaminsky then used his research to bring more awareness to the issue while Sony executives were trying to play it down.
324:
Kaminsky went public after working with the ad networks in question to eliminate the immediate cross-site scripting vulnerability.
272:
551:. According to his mother, "he did things because they were the right thing to do, not because they would elicit financial gain."
1902:
1872:
1857:
1525:
1652:
1877:
1852:
1458:
187:
1211:
1185:
1082:"Dan Kaminsky Discovers Fundamental Issue In DNS: Massive Multivendor Patch Released (Securosis.com) [LWN.net]"
1423:
1262:
723:
392:
Kaminsky responded that he felt it would be morally wrong, and he did not wish for his mother to visit him in prison.
388:
by others. He later presented his findings at the Black Hat
Briefings, at which he wore both a suit and rollerskates.
210:
Daniel Kaminsky was born in San Francisco on February 7, 1979, to Marshall Kaminsky and Trudy Maurer. His mother told
1340:
856:
608:
1717:
1634:
857:"ToorCon Seattle 2008: Nuke plants, non-existent sub domain attacks, muffin diving, and Guitar Hero | Zero Day"
559:
235:
1609:
1481:
370:
971:
574:
1696:
1129:
1099:
666:
1892:
484:
In June 2010, Kaminsky released Interpolique, a beta framework for addressing injection attacks such as
1897:
1247:
1775:
1504:
1395:
1887:
1862:
1064:
509:
456:
226:
692:
1160:
939:"CERT Vulnerability Note VU#800113: Multiple DNS implementations vulnerable to cache poisoning"
239:
101:
1867:
1581:
762:
582:
570:
448:
1743:
1553:
577:, which called him a "friend of freedom and embodiment of the true hacker spirit", and from
1847:
1842:
784:
489:
361:
21:"Daniel Kaminsky" redirects here. For the actor and singer born David Daniel Kaminsky, see
8:
892:
191:
183:
123:
1242:
313:
to provide its advertising, Kaminsky was able to generalize the vulnerability to attack
661:
578:
460:
333:
212:
171:
1802:
1672:"Dan Kaminsky: Tributes pour in for security researcher who died after short illness"
1317:
998:"Dan Kaminsky Discovers Fundamental Issue In DNS: Massive Multivendor Patch Released"
830:
604:
436:
150:
111:
1797:
825:
757:
697:
221:
166:
532:
513:
337:
555:
400:
1836:
1806:
1792:
1638:
1219:
966:
834:
820:
485:
396:
69:
600:
500:
1558:
1530:
1509:
1429:
1400:
1270:
540:
452:
404:
305:. While the vulnerability used initially depended in part on the fact that
864:
693:"ISPs' Error Page Ads Let Hackers Hijack Entire Web, Researcher Discloses"
250:, before founding his own firm White Ops (later renamed Human Security).
1215:
563:
536:
385:
176:
938:
366:
341:
217:
73:
41:
22:
1295:
1243:"Seattle security expert helped uncover major design flaw on Internet"
1586:
428:
374:
306:
263:
1081:
524:
512:
reading "I ♥ Color". Kaminsky developed an app helping people with
464:
357:
349:
298:
294:
290:
276:
247:
182:
Kaminsky was known among computer security experts for his work on
162:
190:
had infected at least 568,000 computers, and for his talks at the
1768:
1137:
1107:
528:
353:
318:
314:
407:(TTL) field would limit a guesser to only a few attempts a day.
1826:
941:. United States Computer Emergency Readiness Team. July 8, 2008
416:
345:
302:
199:
1367:"DNS 2008 and the new (old) nature of critical infrastructure"
175:
labeled Kaminsky an "Internet security savior" and "a digital
921:"EarthLink redirect service poses security risk, expert says"
860:
505:
243:
195:
158:
154:
1582:"Real Black Hats Hack Security Experts on Eve of Conference"
1341:"Hacker History: How Dan Kaminsky Almost Broke the Internet"
336:(DNS) protocol that could allow attackers to easily perform
1189:
544:
523:
wrote that "in a community known for its biting, sometimes
432:
1783:
403:
a second. Instead, other implementers assumed that DNS's
442:
135:
803:"GENESIS, The St. Ignatius College Preparatory Magazine"
198:
as one of the Trusted Community Representatives for the
1829:- security company, of which Dan Kaminsky was a founder
1822:
DNSSEC: What it Means for DNS Security and Your Network
1764:
1653:"Kaminsky Issues Developer Tool To Kill Injection Bugs"
953:
724:"Kaminsky on DNS rebinding attacks, hacking techniques"
657:"Daniel Kaminsky, Internet Security Savior, Dies at 42"
470:
332:
In 2008, Kaminsky discovered a fundamental flaw in the
1793:"Secret Geek A-Team Hacks Back, Defends Worldwide Web"
821:"Secret Geek A-Team Hacks Back, Defends Worldwide Web"
785:"IANA — DNSSEC Project Archive - Launch TCR Selection"
549:
Academic Model Providing Access to Healthcare (AMPATH)
242:. After graduating from college, he worked for Cisco,
597:
Hack proofing your network : internet tradecraft
1092:
989:
585:. On December 14, 2021, that wish came to fruition.
149:(February 7, 1979 – April 23, 2021) was an American
1820:Dan Kaminsky; Scott Rose; Cricket Liu; (June 2009)
1241:Lathrop, Daniel; Shukovsky, Paul (August 3, 2008).
746:
744:
422:
1482:"Dan Kaminsky Feels a disturbance in The Internet"
717:
715:
18:American computer security researcher (1979–2021)
1834:
1505:"Wildcard certificate spoofs web authentication"
1240:
741:
516:, inspired by a friend of his with the disorder.
1396:"Busted! Conficker's tell-tale heart uncovered"
686:
684:
1697:"Security Researcher Dan Kaminsky Passes Away"
1444:
712:
562:, he criticized comments by then-FBI director
888:"More Trouble With Ads on ISPs' Error Pages"
681:
650:
648:
459:protocol. These include the use of the weak
455:, Kaminsky discovered numerous flaws in the
427:On March 27, 2009, Kaminsky discovered that
1718:"Security Researcher Dan Kaminsky Has Died"
1454:Updated Conficker Detection Plugin Released
1186:"Kaminsky's DNS Issue Accidentally Leaked?"
962:"Major DNS flaw could disrupt the Internet"
646:
644:
642:
640:
638:
636:
634:
632:
630:
628:
283:
1689:
1607:
1450:
1387:
912:
495:
365:the problem, Kaminsky initially contacted
40:
1415:
1204:
1178:
1710:
1703:. Wired Business Media. April 24, 2021.
1545:
1526:"Crackers publish hackers' private data"
1290:
1288:
931:
918:
879:
854:
654:
625:
499:
273:Sony BMG copy protection rootkit scandal
262:
1908:St. Ignatius College Preparatory alumni
1554:"Security elite pwned on Black Hat eve"
959:
594:
492:in a manner comfortable to developers.
1835:
1744:"INTERNET HALL of FAME - Dan Kaminsky"
1669:
1579:
1551:
1502:
1479:
1393:
1338:
1028:"Network Security podcast – Episode 7"
995:
750:
721:
690:
443:Flaws in Internet X.509 infrastructure
1790:
1645:
1573:
1517:
1496:
1473:
1421:
1358:
1339:Rashid, Fahmida Y. (April 23, 2018).
1310:
1285:
1234:
1158:
1152:
1074:
885:
818:
722:Mimoso, Michael S. (April 14, 2008).
581:, who said Kaminsky should be in the
1773:
1627:
1610:"Security Gurus 0wned by Black Hats"
1608:Constantin, Lucian (July 30, 2009).
1523:
1364:
848:
777:
569:Kaminsky died on April 23, 2021, of
194:. On June 16, 2010, he was named by
1791:Davis, Joshua (November 24, 2008).
1428:. Skullsecurity.org. Archived from
919:McMillan, Robert (April 19, 2008).
855:McFeters, Nathan (April 21, 2008).
819:Davis, Joshua (November 24, 2008).
751:Norton, Quinn (November 15, 2005).
655:Perlroth, Nicole (April 27, 2021).
216:that after his father bought him a
13:
1883:Deaths from diabetes in California
1457:. Tenable Security. Archived from
1451:Asadoorian, Paul (April 1, 2009).
1318:"Measures to prevent DNS spoofing"
14:
1919:
1758:
1058:"Securosispublications - Article"
1670:Walker, James (April 26, 2021).
1425:Scanning for Conficker with Nmap
1422:Bowes, Ronald (March 30, 2009).
753:"Sony Numbers Add Up to Trouble"
423:Automated detection of Conficker
236:St. Ignatius College Preparatory
1736:
1663:
1601:
1332:
1255:
1218:. July 22, 2008. Archived from
1136:. July 11, 2008. Archived from
1122:
1050:
1020:
960:Messmer, Ellen (July 8, 2008).
886:Krebs, Brian (April 30, 2008).
691:Singel, Ryan (April 19, 2008).
554:Kaminsky was also an outspoken
479:
371:Department of Homeland Security
258:
165:, where he was the director of
92:San Francisco, California, U.S.
1394:Goodin, Dan (March 30, 2009).
1106:. July 9, 2008. Archived from
1100:"An Astonishing Collaboration"
812:
795:
575:Electronic Frontier Foundation
327:
317:by attacking its ad provider,
1:
1903:Santa Clara University alumni
1873:Computer security specialists
1858:American computer specialists
1580:Zetter, Kim (July 29, 2009).
1552:Goodin, Dan (July 29, 2009).
1503:Goodin, Dan (July 30, 2009).
1159:Vixie, Paul (July 14, 2008).
996:Mogull, Rich (July 8, 2008).
618:
504:Kaminsky in 2012, wearing an
447:In 2009, in cooperation with
231:be introduced to his mother.
205:
1878:Computer systems researchers
1853:Activists from San Francisco
1524:Ries, Ulie (July 31, 2009).
599:(1 ed.). Rockland, MA:
560:FBI–Apple encryption dispute
373:and executives at Cisco and
7:
1320:. Ds9a.nl. November 2, 2006
1212:"DNS bug leaks by matasano"
539:technology, and developing
10:
1924:
1750:. ISOC. December 14, 2021.
1248:Seattle Post-Intelligencer
471:Attack by "Zero for 0wned"
20:
1480:Rodney (August 2, 2009).
253:
130:
118:
107:
97:
81:
51:
39:
32:
1635:"Interpolique Home Page"
588:
510:pseudoisochromatic plate
284:Earthlink and DNS lookup
496:Personal life and death
227:San Francisco Chronicle
186:, for showing that the
595:Russell, Ryan (2000).
517:
268:
240:Santa Clara University
102:Santa Clara University
1748:Internet Hall of Fame
1461:on September 26, 2010
1222:on September 17, 2008
1161:"Not a Guessing Game"
583:Internet Hall of Fame
571:diabetic ketoacidosis
558:advocate. During the
503:
476:Black Hat Briefings.
449:Meredith L. Patterson
266:
122:Discovering the 2008
1786:on January 24, 2000.
1188:. Invisible Denizen
974:on February 13, 2009
508:T-shirt depicting a
490:cross-site scripting
1263:"Pwnie Awards 2008"
1070:on August 27, 2008.
1038:on January 29, 2011
893:The Washington Post
547:among refugees for
535:people, working on
222:penetration testing
192:Black Hat Briefings
184:DNS cache poisoning
167:penetration testing
124:DNS cache poisoning
1893:Internet activists
662:The New York Times
521:The New York Times
518:
377:to work on a fix.
334:Domain Name System
269:
234:Kaminsky attended
213:The New York Times
172:The New York Times
1898:Privacy activists
1641:on June 18, 2010.
867:on August 1, 2008
765:on April 23, 2008
669:on April 29, 2021
543:tools related to
463:hash function by
151:computer security
144:
143:
112:Computer security
1915:
1817:
1815:
1813:
1787:
1782:. Archived from
1780:DoxPara Research
1752:
1751:
1740:
1734:
1733:
1731:
1729:
1724:. April 24, 2021
1714:
1708:
1707:
1693:
1687:
1686:
1684:
1682:
1667:
1661:
1660:
1659:. June 14, 2010.
1649:
1643:
1642:
1637:. Archived from
1631:
1625:
1624:
1622:
1620:
1605:
1599:
1598:
1596:
1594:
1577:
1571:
1570:
1568:
1566:
1549:
1543:
1542:
1540:
1538:
1521:
1515:
1514:
1500:
1494:
1493:
1491:
1489:
1477:
1471:
1470:
1468:
1466:
1448:
1442:
1441:
1439:
1437:
1432:on April 2, 2009
1419:
1413:
1412:
1410:
1408:
1391:
1385:
1384:
1382:
1380:
1371:
1362:
1356:
1355:
1353:
1351:
1336:
1330:
1329:
1327:
1325:
1314:
1308:
1307:
1305:
1303:
1292:
1283:
1282:
1280:
1278:
1269:. Archived from
1259:
1253:
1252:
1238:
1232:
1231:
1229:
1227:
1208:
1202:
1201:
1199:
1197:
1182:
1176:
1175:
1173:
1171:
1156:
1150:
1149:
1147:
1145:
1140:on July 15, 2008
1134:DoxPara Research
1126:
1120:
1119:
1117:
1115:
1110:on July 14, 2008
1104:DoxPara Research
1096:
1090:
1089:
1078:
1072:
1071:
1069:
1063:. Archived from
1062:
1054:
1048:
1047:
1045:
1043:
1034:. Archived from
1024:
1018:
1017:
1015:
1013:
1008:on July 11, 2008
1004:. Archived from
993:
987:
986:
981:
979:
970:. Archived from
957:
951:
950:
948:
946:
935:
929:
928:
916:
910:
909:
907:
905:
896:. Archived from
883:
877:
876:
874:
872:
863:. Archived from
852:
846:
845:
843:
841:
816:
810:
809:
807:
799:
793:
792:
781:
775:
774:
772:
770:
761:. Archived from
748:
739:
738:
736:
734:
719:
710:
709:
707:
705:
688:
679:
678:
676:
674:
665:. Archived from
652:
614:
340:attacks on most
267:Kaminsky in 2014
140:
137:
88:
66:February 7, 1979
65:
63:
46:Kaminsky in 2007
44:
30:
29:
1923:
1922:
1918:
1917:
1916:
1914:
1913:
1912:
1888:Ethical hackers
1863:Avaya employees
1833:
1832:
1811:
1809:
1774:Kaminsky, Dan.
1761:
1756:
1755:
1742:
1741:
1737:
1727:
1725:
1716:
1715:
1711:
1695:
1694:
1690:
1680:
1678:
1668:
1664:
1651:
1650:
1646:
1633:
1632:
1628:
1618:
1616:
1606:
1602:
1592:
1590:
1578:
1574:
1564:
1562:
1550:
1546:
1536:
1534:
1522:
1518:
1501:
1497:
1487:
1485:
1478:
1474:
1464:
1462:
1449:
1445:
1435:
1433:
1420:
1416:
1406:
1404:
1392:
1388:
1378:
1376:
1369:
1365:Kaminsky, Dan.
1363:
1359:
1349:
1347:
1337:
1333:
1323:
1321:
1316:
1315:
1311:
1301:
1299:
1294:
1293:
1286:
1276:
1274:
1261:
1260:
1256:
1239:
1235:
1225:
1223:
1210:
1209:
1205:
1195:
1193:
1192:. July 21, 2008
1184:
1183:
1179:
1169:
1167:
1157:
1153:
1143:
1141:
1128:
1127:
1123:
1113:
1111:
1098:
1097:
1093:
1080:
1079:
1075:
1067:
1060:
1056:
1055:
1051:
1041:
1039:
1026:
1025:
1021:
1011:
1009:
994:
990:
977:
975:
958:
954:
944:
942:
937:
936:
932:
917:
913:
903:
901:
884:
880:
870:
868:
853:
849:
839:
837:
817:
813:
805:
801:
800:
796:
783:
782:
778:
768:
766:
749:
742:
732:
730:
728:Search Security
720:
713:
703:
701:
689:
682:
672:
670:
653:
626:
621:
611:
591:
514:color blindness
498:
482:
473:
445:
425:
401:network sockets
338:cache poisoning
330:
286:
261:
256:
208:
147:Daniel Kaminsky
134:
98:Alma mater
93:
90:
86:
77:
67:
61:
59:
58:
57:
56:Daniel Kaminsky
47:
35:
26:
19:
12:
11:
5:
1921:
1911:
1910:
1905:
1900:
1895:
1890:
1885:
1880:
1875:
1870:
1865:
1860:
1855:
1850:
1845:
1831:
1830:
1827:Human Security
1824:
1818:
1788:
1771:
1760:
1759:External links
1757:
1754:
1753:
1735:
1709:
1688:
1676:The Daily Swig
1662:
1644:
1626:
1600:
1572:
1544:
1516:
1495:
1484:. SemiAccurate
1472:
1443:
1414:
1386:
1357:
1331:
1309:
1284:
1273:on May 6, 2021
1254:
1233:
1203:
1177:
1151:
1121:
1091:
1073:
1049:
1019:
988:
952:
930:
911:
900:on May 3, 2011
878:
847:
811:
808:. Spring 2022.
794:
776:
740:
711:
680:
623:
622:
620:
617:
616:
615:
609:
590:
587:
556:privacy rights
497:
494:
481:
478:
472:
469:
444:
441:
424:
421:
329:
326:
285:
282:
260:
257:
255:
252:
207:
204:
142:
141:
132:
128:
127:
120:
119:Known for
116:
115:
109:
105:
104:
99:
95:
94:
91:
89:(aged 42)
85:April 23, 2021
83:
79:
78:
68:
55:
53:
49:
48:
45:
37:
36:
33:
17:
9:
6:
4:
3:
2:
1920:
1909:
1906:
1904:
1901:
1899:
1896:
1894:
1891:
1889:
1886:
1884:
1881:
1879:
1876:
1874:
1871:
1869:
1866:
1864:
1861:
1859:
1856:
1854:
1851:
1849:
1846:
1844:
1841:
1840:
1838:
1828:
1825:
1823:
1819:
1808:
1804:
1800:
1799:
1794:
1789:
1785:
1781:
1777:
1772:
1770:
1766:
1763:
1762:
1749:
1745:
1739:
1723:
1719:
1713:
1706:
1702:
1701:Security Week
1698:
1692:
1677:
1673:
1666:
1658:
1654:
1648:
1640:
1636:
1630:
1615:
1611:
1604:
1589:
1588:
1583:
1576:
1561:
1560:
1555:
1548:
1533:
1532:
1527:
1520:
1512:
1511:
1506:
1499:
1483:
1476:
1460:
1456:
1455:
1447:
1431:
1427:
1426:
1418:
1403:
1402:
1397:
1390:
1375:
1368:
1361:
1346:
1342:
1335:
1319:
1313:
1297:
1296:"DNS forgery"
1291:
1289:
1272:
1268:
1264:
1258:
1250:
1249:
1244:
1237:
1221:
1217:
1213:
1207:
1191:
1187:
1181:
1166:
1162:
1155:
1139:
1135:
1131:
1125:
1109:
1105:
1101:
1095:
1087:
1083:
1077:
1066:
1059:
1053:
1037:
1033:
1032:hw.libsyn.com
1029:
1023:
1007:
1003:
999:
992:
985:
973:
969:
968:
967:Network World
963:
956:
940:
934:
926:
922:
915:
899:
895:
894:
889:
882:
866:
862:
858:
851:
836:
832:
828:
827:
822:
815:
804:
798:
790:
786:
780:
764:
760:
759:
754:
747:
745:
729:
725:
718:
716:
700:
699:
694:
687:
685:
668:
664:
663:
658:
651:
649:
647:
645:
643:
641:
639:
637:
635:
633:
631:
629:
624:
612:
610:1-928994-15-6
606:
602:
598:
593:
592:
586:
584:
580:
576:
572:
567:
565:
561:
557:
552:
550:
546:
542:
538:
534:
530:
527:discourse on
526:
522:
515:
511:
507:
502:
493:
491:
487:
486:SQL injection
477:
468:
466:
462:
458:
454:
450:
440:
438:
434:
430:
420:
418:
412:
408:
406:
402:
398:
397:Dan Bernstein
393:
389:
387:
381:
378:
376:
372:
368:
363:
359:
355:
351:
347:
343:
339:
335:
325:
322:
320:
316:
312:
308:
304:
300:
296:
292:
281:
278:
274:
265:
251:
249:
245:
241:
237:
232:
229:
228:
223:
219:
215:
214:
203:
201:
197:
193:
189:
185:
180:
178:
174:
173:
168:
164:
160:
156:
152:
148:
139:
133:
129:
126:vulnerability
125:
121:
117:
113:
110:
106:
103:
100:
96:
84:
80:
75:
71:
70:San Francisco
54:
50:
43:
38:
31:
28:
24:
16:
1868:Cisco people
1810:. Retrieved
1796:
1784:the original
1779:
1765:Dan Kaminsky
1747:
1738:
1726:. Retrieved
1721:
1712:
1704:
1700:
1691:
1679:. Retrieved
1675:
1665:
1657:Dark Reading
1656:
1647:
1639:the original
1629:
1617:. Retrieved
1613:
1603:
1591:. Retrieved
1585:
1575:
1563:. Retrieved
1559:The Register
1557:
1547:
1535:. Retrieved
1531:heise online
1529:
1519:
1510:The Register
1508:
1498:
1486:. Retrieved
1475:
1463:. Retrieved
1459:the original
1453:
1446:
1434:. Retrieved
1430:the original
1424:
1417:
1405:. Retrieved
1401:The Register
1399:
1389:
1377:. Retrieved
1374:blackhat.com
1373:
1360:
1348:. Retrieved
1344:
1334:
1322:. Retrieved
1312:
1300:. Retrieved
1275:. Retrieved
1271:the original
1266:
1257:
1246:
1236:
1224:. Retrieved
1220:the original
1214:. beezari's
1206:
1194:. Retrieved
1180:
1168:. Retrieved
1165:Circleid.com
1164:
1154:
1142:. Retrieved
1138:the original
1133:
1124:
1112:. Retrieved
1108:the original
1103:
1094:
1085:
1076:
1065:the original
1052:
1040:. Retrieved
1036:the original
1031:
1022:
1010:. Retrieved
1006:the original
1001:
991:
983:
976:. Retrieved
972:the original
965:
955:
945:November 27,
943:. Retrieved
933:
924:
914:
902:. Retrieved
898:the original
891:
881:
869:. Retrieved
865:the original
850:
838:. Retrieved
824:
814:
797:
789:www.iana.org
788:
779:
767:. Retrieved
763:the original
756:
731:. Retrieved
727:
702:. Retrieved
696:
671:. Retrieved
667:the original
660:
596:
568:
553:
541:telemedicine
525:misogynistic
520:
519:
483:
480:Interpolique
474:
453:Len Sassaman
446:
426:
413:
409:
405:time to live
394:
390:
382:
379:
331:
323:
287:
270:
259:Sony rootkit
233:
225:
211:
209:
188:Sony rootkit
181:
170:
146:
145:
87:(2021-04-23)
34:Dan Kaminsky
27:
15:
1848:2021 deaths
1843:1979 births
1488:January 25,
1324:January 25,
1302:January 25,
1216:LiveJournal
1170:January 25,
1130:"Ow My Toe"
1042:January 12,
871:January 25,
564:James Comey
537:hearing aid
342:nameservers
328:Flaw in DNS
271:During the
177:Paul Revere
136:dankaminsky
1837:Categories
1298:. Cr.yp.to
1267:pwnies.com
619:References
533:colorblind
367:Paul Vixie
309:was using
218:RadioShack
206:Early life
114:researcher
108:Occupation
74:California
62:1979-02-07
23:Danny Kaye
1807:1059-1028
1776:"Welcome"
1728:April 24,
1681:April 28,
1619:April 28,
1614:Softpedia
1587:Wired.com
1436:March 31,
1407:March 31,
1379:April 30,
1350:April 28,
1277:April 28,
1002:securosis
925:InfoWorld
835:1059-1028
673:April 27,
579:Jeff Moss
429:Conficker
375:Microsoft
311:Barefruit
307:Earthlink
295:Rickrolls
1722:CircleID
1593:July 31,
1565:July 31,
1537:July 31,
1465:April 2,
1226:July 30,
1196:July 30,
1144:June 14,
1114:June 14,
1012:June 14,
978:June 14,
601:Syngress
465:Verisign
386:mirrored
358:Secure64
350:PowerDNS
299:Facebook
291:phishing
277:Sony BMG
275:, where
248:IOActive
163:IOActive
1769:Twitter
1345:Duo.com
1086:lwn.net
904:May 19,
769:May 19,
733:May 19,
704:May 19,
529:Twitter
362:Unbound
354:MaraDNS
319:Paxfire
315:Verizon
131:Website
1812:May 1,
1805:
840:May 1,
833:
607:
506:ironic
437:Nessus
417:DNSSEC
346:djbdns
303:PayPal
254:Career
246:, and
202:root.
200:DNSSEC
161:, and
76:, U.S.
1798:Wired
1370:(PDF)
1068:(PDF)
1061:(PDF)
861:ZDNet
826:Wired
806:(PDF)
758:Wired
698:Wired
589:Works
244:Avaya
196:ICANN
159:Avaya
155:Cisco
1814:2021
1803:ISSN
1730:2021
1683:2021
1621:2021
1595:2009
1567:2009
1539:2009
1490:2013
1467:2009
1438:2009
1409:2009
1381:2021
1352:2021
1326:2013
1304:2013
1279:2021
1228:2008
1198:2008
1190:blog
1172:2013
1146:2021
1116:2021
1044:2022
1014:2021
980:2021
947:2008
906:2008
873:2013
842:2021
831:ISSN
771:2008
735:2008
706:2008
675:2021
605:ISBN
545:AIDS
488:and
451:and
435:and
433:NMap
360:and
301:and
238:and
138:.com
82:Died
52:Born
1767:on
461:MD2
457:SSL
297:on
179:".
1839::
1801:.
1795:.
1778:.
1746:.
1720:.
1699:.
1674:.
1655:.
1612:.
1584:.
1556:.
1528:.
1507:.
1398:.
1372:.
1343:.
1287:^
1265:.
1245:.
1163:.
1132:.
1102:.
1084:.
1030:.
1000:.
982:.
964:.
923:.
890:.
859:.
829:.
823:.
787:.
755:.
743:^
726:.
714:^
695:.
683:^
659:.
627:^
603:.
439:.
356:,
352:,
348:,
321:.
169:.
157:,
72:,
1816:.
1732:.
1685:.
1623:.
1597:.
1569:.
1541:.
1513:.
1492:.
1469:.
1440:.
1411:.
1383:.
1354:.
1328:.
1306:.
1281:.
1251:.
1230:.
1200:.
1174:.
1148:.
1118:.
1088:.
1046:.
1016:.
949:.
927:.
908:.
875:.
844:.
791:.
773:.
737:.
708:.
677:.
613:.
344:(
64:)
60:(
25:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.