Post AwCSK4Y0GyVioS92oa by [email protected] | |
More posts by [email protected] | |
Post #AwBnYz8oYjRSGiM5YW by [email protected] | |
0 likes, 2 repeats | |
Hackers exploit a blind spot by hiding malware inside DNS recordsTechnique tran… | |
Post #AwBthvwOQWVCfrCApk by [email protected] | |
0 likes, 1 repeats | |
@arstechnica Cobalt Strike has been capable of DNS communications for a decade … | |
Post #AwByYJENTnLhmXpzt2 by [email protected] | |
0 likes, 1 repeats | |
@arstechnica not surprising, it's been a classic CTF challenge for over a d… | |
Post #AwBzRBJId6h98yIxsG by [email protected] | |
0 likes, 0 repeats | |
@arstechnica @Quinnypig relevant to your DNS interests | |
Post #AwC2FNzvvny8shJVk8 by [email protected] | |
0 likes, 0 repeats | |
@arstechnica Way back when, I recall an http proxy using DNS for transport. IIR… | |
Post #AwCFEY26R1IL7QG7l2 by [email protected] | |
0 likes, 0 repeats | |
@w_b @arstechnica I recall someone putting decss.c into the DNS. Everything old… | |
Post #AwCITZXZPalK05pjbU by [email protected] | |
0 likes, 0 repeats | |
@arstechnica I remember Dan Kaminsky demonstrating this very technique almost 2… | |
Post #AwCKA5f4Td45jrBDwe by [email protected] | |
0 likes, 0 repeats | |
@arstechnica Ha! One of these TXT records might have been mine. I swear it is a… | |
Post #AwCNzEyxsiF9HIZDk0 by [email protected] | |
0 likes, 1 repeats | |
@w_b @arstechnica This is so cursed | |
Post #AwCSK4Y0GyVioS92oa by [email protected] | |
0 likes, 0 repeats | |
@arstechnica Hex? Just wait til these guys discover base64. 😆 WebRTC is also… | |
Post #AwG6FprtUFdLlhrYhc by [email protected] | |
0 likes, 0 repeats | |
@[email protected] @[email protected] nothing is new in securit… | |
Post #AwG6GSxa92MB0dp9U0 by [email protected] | |
0 likes, 0 repeats | |
@mweiss @arstechnica its a pity the pupy github repo went archive 2 months ago.… |