<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=utf-8">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    The US Army recently released <a
href="http://gizmodo.com/the-army-just-open-sourced-its-security-software-1683023527">DShell</a>,
    which they've been using to do network incident response, as open
    source. Part of it is a <a
href="https://github.com/USArmyResearchLab/Dshell/blob/master/decoders/dns/innuendo-dns.py">DNS
      decoder</a> that tries to find INNUENDO traffic. Although they
    developed it only by looking at our <a
      href="https://vimeo.com/115206626">demonstration video</a> (note:
    email <a class="moz-txt-link-abbreviated" href="mailto:admin@immunityinc.com">admin@immunityinc.com</a> for an eval copy of INNUENDO!) we can
    confirm their script works (see below).<br>
    <br>
    It may, or may not, work against the <b>next</b> version of
    INNUENDO. ;&gt;<br>
    <br>
    Thanks,<br>
    Dave Aitel<br>
    Immunity, Inc.<br>
    <br>
    <img alt="Dshell image"
      src="cid:part4.00070701.04050309@immunityinc.com" height="533"
      width="1680"><br>
  </body>
</html>