DNS hijacking/poisoning effect on URL/URI and password manager autotype/autofill

A benefit to password managers, at least some of them, is that they can look at the URL and only use autotype/autofill when on the correct site, which can help prevent pharming since if instead of https://www.example.com/ you go to examp1e… Continue reading DNS hijacking/poisoning effect on URL/URI and password manager autotype/autofill

How can I manipulate certain server side responses? Specifically Ajax Responses? XXE Attack? Hybrid DNS Resolution?

I would like to be able to switch back and forth between the real DNS and maybe setting a local DNS entry so I can manipulate AJAX responses for code security checks.
For instance if the server responds with Ajax on page 1 that page 2 is n… Continue reading How can I manipulate certain server side responses? Specifically Ajax Responses? XXE Attack? Hybrid DNS Resolution?

Can you guys help me on my decentralized and non-pyramidal DNS PKI secured with Wireguard and gnupg open source project?

I can regularly observe TLS 1.3 secured website duplications. The attacker indicates its presence by slight modifications on the web page. In particular I obseved this on the two following web pages:
https://en.wikipedia.org/wiki/Henry_Kis… Continue reading Can you guys help me on my decentralized and non-pyramidal DNS PKI secured with Wireguard and gnupg open source project?

Someone issued fake CAA records for my domain. What is the most important thing to do to resolve it?

First, I can update this with the affected domain, if it’s critical, but for obvious reasons I’d like not to be the target of more problems.
Someone registered some CAA records for my domain.
I have full control of all related accounts: Re… Continue reading Someone issued fake CAA records for my domain. What is the most important thing to do to resolve it?

How to stop/reduce constant DNS Spoof/Poisoning Attack from NGINX server if DNSSEC is not offered from provider?

Currently my domain is sitting without DNSSEC security because my domain provider didnt support it for my ccTLD domain, the feature will only be available once i renew my domain in about 2 months time.
As you can maybe guess, i am a vitcim… Continue reading How to stop/reduce constant DNS Spoof/Poisoning Attack from NGINX server if DNSSEC is not offered from provider?

This Week in Security: uClibc and DNS Poisoning, Encryption is Hard, and the Goat

DNS spoofing/poisoning is the attack discovered by [Dan Kaminski] back in 2008 that simply refuses to go away. This week a vulnerability was announced in the uClibc and uClibc-ng standard …read more Continue reading This Week in Security: uClibc and DNS Poisoning, Encryption is Hard, and the Goat

Suspicious ip address of our mail domain found on talosintelligence.com (spoofing attempt)

We have a fair amount of email traffic. Recently, we had some suspicious email spoofing attacks and a lot of users reported that outgoing emails were marked as spam and landed in junk folder (reported by mail recipients). When we checked o… Continue reading Suspicious ip address of our mail domain found on talosintelligence.com (spoofing attempt)