This document summarizes Dan Kaminsky's 2008 talk at Black Hat about a vulnerability he discovered in the Domain Name System (DNS) that allowed attackers to spoof DNS responses. The vulnerability, known as DNS cache poisoning, could allow attackers to redirect traffic to malicious websites by guessing the random transaction ID associated with DNS queries. Kaminsky worked with DNS developers and organizations to coordinate a massive patching effort that updated DNS servers for over 120 million users within a few weeks. His talk analyzed the impact of the patching and discussed the technical details of how the vulnerability worked.