Post AwC8GVZvpczKPH4P1E by [email protected] | |
More posts by [email protected] | |
Post #AwC7riGHXV0mVF3VVA by [email protected] | |
0 likes, 1 repeats | |
Attackers exploit a blind spot by hiding malware inside DNS records. This techn… | |
Post #AwC8GVZvpczKPH4P1E by [email protected] | |
0 likes, 0 repeats | |
@nixCraft > Being that the malicious stager script is stored in a DNS TXT re… | |
Post #AwC8MkIc0u5BncwXFg by [email protected] | |
0 likes, 0 repeats | |
@nixCraft Well, I remember Iodine that was tunnelling tcp over dns so... | |
Post #AwC8ke6ShYwTX6el4C by [email protected] | |
0 likes, 0 repeats | |
@nixCraft And “Let’s Encrypt” uses DNS TXT records for verification, so t… | |
Post #AwC8mNOZnA0eIGxEem by [email protected] | |
0 likes, 0 repeats | |
@nixCraft Oh, good. | |
Post #AwC9HiP7jPwaQd9blY by [email protected] | |
0 likes, 0 repeats | |
@nixCraft "blind" if dont remember the other times this was done | |
Post #AwCAa0QfYP1LUyA8IK by [email protected] | |
0 likes, 0 repeats | |
And now we just wait DNS to break in new ways before of ill-advised filters (as… | |
Post #AwCEftjNlo14HKyqMS by [email protected] | |
0 likes, 0 repeats | |
@nixCraft it's Bonzi Buddy's dog lmao | |
Post #AwCEi4hFyFWwrq1YI4 by [email protected] | |
0 likes, 0 repeats | |
@nixCraft Always DNS... | |
Post #AwCEmmshdSBh3tcofg by [email protected] | |
0 likes, 1 repeats | |
@nixCraft yup. unusual and hard to filter DNS for any random FQDN TXT record un… | |
Post #AwCEyfZMe9dBrLFHLk by [email protected] | |
0 likes, 0 repeats | |
@nixCraft I might write a cyberpunk novel featuring vigilantes who track these … |