Subscribe via feed.

Microsoft dnslint.exe DNS Tool Forced Drive-By Download

Posted by deepcore on July 22, 2018 – 12:14 am

Microsoft’s dnslint.exe tool does not verify domain names when parsing DNS text-files using the “/ql” switch making it prone to forced drive-by downloads, providing an end user is tricked into using a server text-file containing a script/binary reference instead of a normally expected domain name.


This post is under “exploit” and has no respond so far.
If you enjoy this article, make sure you subscribe to my RSS Feed.

Post a reply

You must be logged in to post a comment.