<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=utf-8">
</head>
<body bgcolor="#FFFFFF" text="#000000">
The US Army recently released <a
href="http://gizmodo.com/the-army-just-open-sourced-its-security-software-1683023527">DShell</a>,
which they've been using to do network incident response, as open
source. Part of it is a <a
href="https://github.com/USArmyResearchLab/Dshell/blob/master/decoders/dns/innuendo-dns.py">DNS
decoder</a> that tries to find INNUENDO traffic. Although they
developed it only by looking at our <a
href="https://vimeo.com/115206626">demonstration video</a> (note:
email <a class="moz-txt-link-abbreviated" href="mailto:admin@immunityinc.com">admin@immunityinc.com</a> for an eval copy of INNUENDO!) we can
confirm their script works (see below).<br>
<br>
It may, or may not, work against the <b>next</b> version of
INNUENDO. ;><br>
<br>
Thanks,<br>
Dave Aitel<br>
Immunity, Inc.<br>
<br>
<img alt="Dshell image"
src="cid:part4.00070701.04050309@immunityinc.com" height="533"
width="1680"><br>
</body>
</html>