Category Archives: dns
Is MFA a Security Illusion?
A recent Akamai Security blog post, Massive Campaign Targeting UK Banks Bypassing 2FA, written by my colleague Or Katz, is a great insight into how attackers used very simple techniques to bypass two-factor (2FA) authentication security to obtain acces… Continue reading Is MFA a Security Illusion?
Is MFA a Security Illusion?
A recent Akamai Security blog post, Massive Campaign Targeting UK Banks Bypassing 2FA, written by my colleague Or Katz, is a great insight into how attackers used very simple techniques to bypass two-factor (2FA) authentication security to obtain access to U.K. consumers’ bank accounts. Continue reading Is MFA a Security Illusion?
Snort DNS rule immersive labs
The question is
"Create a rule to detect DNS requests to ‘interbanx’, then test the
rule with the scanner and submit the token."
My rule is:
alert udp any any -> any 53 (msg:"alert"; sid:5000001; content:"|09|… Continue reading Snort DNS rule immersive labs
How is DNS sinkhole being use?
I had some difficulty in grasping the concept on how "DNS sinkhole" is being utilize.
Is it like setting up something similar to a honeypot to lure attackers away from the actual network, so that we as "cyber analyst" w… Continue reading How is DNS sinkhole being use?
DNS Cache Poisoning With Multiple Requests
I am trying to understand this DNS cache poisoning from a textbook.
Is it the case that the server does not check any pending requests for a given domain and will send all of the n "same" requests to the DNS Lookup?
If the attac… Continue reading DNS Cache Poisoning With Multiple Requests
Compromised enterprise devices detection based on abnormal behavior patterns– UEBA in action
Recently, many reports of incidents have been making headlines, proving that no business or industry is immune to advanced threat actors. Applying user and entity behavior analytics (UEBA) for the challenging task of the detection of compromised devices over time can play a critical role in enterprises’ defense mechanisms. Continue reading Compromised enterprise devices detection based on abnormal behavior patterns– UEBA in action
Using iptables to set up a killswitch for openvpn: DNS requests are blocked but they shouldn’t
I bought a subscription to a VPN service and I am using the openvpn 2.5.1 client to connect to it. I am using Ubuntu 20.10.
I now want to emulate the "kill switch" feature of most proprietary VPN client.
That is, I want to block … Continue reading Using iptables to set up a killswitch for openvpn: DNS requests are blocked but they shouldn’t
Need to find domains in a TLD [closed]
I was wondering if it is possible to get all website domains for a specific country.
For example, let’s take UK. All the websites connected to the UK end with a .uk in their domain. I was wondering if there is a way to get all the website… Continue reading Need to find domains in a TLD [closed]
Brave browser Tor feature leaked .Onion queries to ISPs
By Waqas
According to a researcher, the Chromium-based, privacy-focused Brave browser has a vulnerability that’s leaking DNS requests.
This is a post from HackRead.com Read the original post: Brave browser Tor feature leaked .Onion queries to ISPs
Continue reading Brave browser Tor feature leaked .Onion queries to ISPs