<div dir="ltr">Damn--I just registered HMAQTD5H6IASATS3FUWI4QNTOVCF6G7AUIAX6JBY2AR3RUJ5R.biz to help market my ruggedized radio gear to the military.<div><br></div><div>I hope the person writing detection regexes didn&#39;t cut any corners.</div><div><br></div><div>B</div></div><div class="gmail_extra"><br><div class="gmail_quote">On Tue, Feb 3, 2015 at 2:06 PM, Dave Aitel <span dir="ltr">&lt;<a href="mailto:dave@immunityinc.com" target="_blank">dave@immunityinc.com</a>&gt;</span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
  

    
  
  <div bgcolor="#FFFFFF" text="#000000">
    The US Army recently released <a href="http://gizmodo.com/the-army-just-open-sourced-its-security-software-1683023527" target="_blank">DShell</a>,
    which they&#39;ve been using to do network incident response, as open
    source. Part of it is a <a href="https://github.com/USArmyResearchLab/Dshell/blob/master/decoders/dns/innuendo-dns.py" target="_blank">DNS
      decoder</a> that tries to find INNUENDO traffic. Although they
    developed it only by looking at our <a href="https://vimeo.com/115206626" target="_blank">demonstration video</a> (note:
    email <a href="mailto:admin@immunityinc.com" target="_blank">admin@immunityinc.com</a> for an eval copy of INNUENDO!) we can
    confirm their script works (see below).<br>
    <br>
    It may, or may not, work against the <b>next</b> version of
    INNUENDO. ;&gt;<br>
    <br>
    Thanks,<br>
    Dave Aitel<br>
    Immunity, Inc.<br>
    <br>
    <img alt="Dshell image" src="cid:part4.00070701.04050309@immunityinc.com" height="533" width="1680"><br>
  </div>

<br>_______________________________________________<br>
Dailydave mailing list<br>
<a href="mailto:Dailydave@lists.immunityinc.com">Dailydave@lists.immunityinc.com</a><br>
<a href="https://lists.immunityinc.com/mailman/listinfo/dailydave" target="_blank">https://lists.immunityinc.com/mailman/listinfo/dailydave</a><br>
<br></blockquote></div><br></div>