Posing as a DNS Server to hack your computer!
Internet User from the USA | 22.12.2004 00:25 | Repression | Social Struggles | Technology | World
You could access any network anywhere in the world using the masked dns server for any corporation--just think of the havic one could cause if you had a copy of this spoofing software.
Or, perhaps you might want to change the out come of an election, think how easy it would be to change the vote count and put your gay or gal into office. That is what you could do if you had a cpy of this spoofing software to hide who you are and use a masked (not real) dns server!
I am not a criminal but I have to tell you folks that this is the most dangerious attacks on any computer or network. These creeps have to be found and that software has to be destoryed. Or we are all in for unwanted attacks by real criminals using this software!
From my firewall log. I cut and pasted to save space and not reveal some ip addresses I visit all the time which are pro Republic and to the left not the nut cases from the right of the political game.
Date of Creation: 12/21/04, 4:14:27 AM
Log period: From 12/20/04, 3:20:28 AM to 12/21/04, 2:35:31 AM
Ê 12/21/04, 2:32:25 AM 209.244.0.3 resolver1.level3.net Connection to: TCP domain
Ê 12/20/04, 3:48:55 PM 209.244.0.3 resolver1.level3.net Connection to: TCP domain
Ê 12/20/04, 3:48:54 PM 209.244.0.3 resolver1.level3.net Connection to: TCP domain
Ê 12/20/04, 11:40:07 AM 209.244.0.3 resolver1.level3.net Connection to: TCP domain
Ê 12/20/04, 11:40:04 AM 209.244.0.3 resolver1.level3.net Connection to: TCP domain
Ê 12/20/04, 11:40:00 AM 209.244.0.3 resolver1.level3.net Connection to: TCP domain
Date of Creation: 09/22/2004, 05:12:33 AM
Log period: From 09/21/2004, 02:56:47 PM to 09/22/2004, 05:10:25 AM
Ê 09/22/2004, 05:09:05 AM 209.244.0.4 resolver2.level3.net Connection to: TCP domain
Ê 09/22/2004, 05:09:05 AM 209.244.0.4 resolver2.level3.net Connection to: TCP domain
Ê 09/21/2004, 06:02:07 PM 209.244.0.3 resolver1.level3.net Connection to: TCP domain
Ê 09/21/2004, 06:02:07 PM 209.244.0.3 resolver1.level3.net Connection to: TCP domain
Ê 09/21/2004, 06:02:06 PM 209.244.0.3 resolver1.level3.net Connection to: TCP domain
Ê 09/21/2004, 06:02:06 PM 209.244.0.3 resolver1.level3.net Connection to: TCP domain
If I had this software I'd go after all the money bill gates and co has. Cause to tell you that someone with this software can mask their true ip to get past firewalls is an opporttunity to really take everything away from the rich and give it all back to the people of the world. You could go right through any firewall, it doesn't matter what type of computer, what type of os you are using; windows, mac, linix or even unix, you can break through by using a masked IP DNS server.
In calling level3.net I was able to find out that verizon.net uses level3.net services for their customers. And I do receive alot of tracffic from them!
Ê 12/20/04, 3:37:49 PM 4.60.116.66 lsanca1-ar12-4-60-116-066.lsanca1.dsl-verizon.net Enter Stop List manually
Ê 12/20/04, 3:34:23 PM 4.60.116.66 lsanca1-ar12-4-60-116-066.lsanca1.dsl-verizon.net Connection from: TCP SMB over IP
Ê 12/20/04, 3:34:20 PM 4.60.116.66 lsanca1-ar12-4-60-116-066.lsanca1.dsl-verizon.net Connection from: TCP SMB over IP
Ê 12/20/04, 1:17:18 PM 70.19.115.164 static-70-19-115-164.ny325.east.verizon.net Incoming communication rejected: Host in Stop List TCP SMB over IP
Ê 12/20/04, 1:17:18 PM 70.19.115.164 static-70-19-115-164.ny325.east.verizon.net Incoming communication rejected: Host in Stop List TCP NETBIOS Session Service
Ê 12/20/04, 1:17:15 PM 70.19.115.164 static-70-19-115-164.ny325.east.verizon.net Incoming communication rejected: Host in Stop List TCP NETBIOS Session Service
Ê 12/20/04, 1:17:14 PM 70.19.115.164 static-70-19-115-164.ny325.east.verizon.net Incoming communication rejected: Host in Stop List TCP SMB over IP
Ê 12/20/04, 1:16:01 PM 70.19.115.164 static-70-19-115-164.ny325.east.verizon.net Incoming communication rejected: Host in Stop List TCP SMB over IP
Ê 12/20/04, 1:16:01 PM 70.19.115.164 static-70-19-115-164.ny325.east.verizon.net Incoming communication rejected: Host in Stop List TCP NETBIOS Session Service
Ê 12/20/04, 1:15:57 PM 70.19.115.164 static-70-19-115-164.ny325.east.verizon.net Incoming communication rejected: Host in Stop List TCP SMB over IP
Ê 12/20/04, 1:15:57 PM 70.19.115.164 static-70-19-115-164.ny325.east.verizon.net Incoming communication rejected: Host in Stop List TCP NETBIOS Session Service
Ê 12/20/04, 1:15:51 PM 70.19.115.164 static-70-19-115-164.ny325.east.verizon.net Incoming communication rejected: Host in Stop List TCP NETBIOS Session Service
Ê 12/20/04, 1:15:51 PM 70.19.115.164 static-70-19-115-164.ny325.east.verizon.net Incoming communication rejected: Host in Stop List TCP SMB over IP
Ê 12/20/04, 1:13:20 PM 4.30.26.101 wbar15.lax1-4.30.26.101.lax1.dsl-verizon.net Connection from: TCP SMB over IP
Ê 12/20/04, 1:13:14 PM 4.30.26.101 wbar15.lax1-4.30.26.101.lax1.dsl-verizon.net Connection from: TCP SMB over IP
Ê 12/20/04, 1:13:13 PM 4.30.26.101 wbar15.lax1-4.30.26.101.lax1.dsl-verizon.net Connection from: TCP SMB over IP
Date of Creation: 09/22/2004, 05:12:33 AM
Log period: From 09/21/2004, 02:56:47 PM to 09/22/2004, 05:10:25 AM
Ê 09/21/2004, 03:21:32 PM 4.3.202.235 lsanca1-ar54-4-3-202-235.lsanca1.dsl-verizon.net Connection from: TCP Port 2745
Ê 09/21/2004, 03:21:26 PM 4.3.202.235 lsanca1-ar54-4-3-202-235.lsanca1.dsl-verizon.net Connection from: TCP Port 2745
Ê 09/21/2004, 03:21:23 PM 4.3.202.235 lsanca1-ar54-4-3-202-235.lsanca1.dsl-verizon.net Connection from: TCP Port 2745
Ê 09/21/2004, 03:20:57 PM 4.13.100.2 wbar8.dal1-4-13-100-002.dsl-verizon.net Connection from: TCP SMB over IP
Ê 09/21/2004, 03:20:55 PM 4.13.100.2 wbar8.dal1-4-13-100-002.dsl-verizon.net Connection from: TCP SMB over IP
Just afew attackers coming in from verizon. It could be that one of these interesting nuts has such software to pose as a dns server?
Internet User from the USA
e-mail:
gray_wolf348@hotmail.com