Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Considering how many office networks use 192.168.. or 10..., I'm not sure that in practice you're REALLY* leaking all that much... I mean it's a little bit of a hint, but if you can control a bridged device with internal network access, you'll probably get the same info (roughly) from a port scan. The "breach of info" is overblown imho.


In practice internal only DNS names will always leak to external resolvers in one way or another. Pretending otherwise is very naive.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: