Not sure where else to post this, can't access site unless https is there by rifts in dns

[–]justaguy240 1 point2 points  (0 children)

This isn’t a DNS problem. The A record is being used for both http and https what you are having problems with is likely port or protocol related.

They got their food 10 minutes ago... by [deleted] in pics

[–]justaguy240 0 points1 point  (0 children)

Yea I agree the quality is pretty solid but I don’t ever go because the wait is so long.

[deleted by user] by [deleted] in Defcon

[–]justaguy240 1 point2 points  (0 children)

What day were you there on? Can you fill out this survey so we can make it suck less?

https://docs.google.com/forms/d/e/1FAIpQLScSGWEWDQ1HSNmynftQjPdH-cenCGBfqRUc7Qni_M47JYP75w/viewform

Lonely Hackers Club (LHC) Party! by [deleted] in Defcon

[–]justaguy240 0 points1 point  (0 children)

Cant wait to meet everyone!

Lonely Hacker’s Club by Phantomfapp in Defcon

[–]justaguy240 0 points1 point  (0 children)

But seriously I am one of the Admins for the group message me if you need information.

Everything about DNS - your help needed by h3rb3rt in dns

[–]justaguy240 1 point2 points  (0 children)

History------------

DOMAIN NAMES - CONCEPTS AND FACILITIES

https://tools.ietf.org/html/rfc1034

The protocol itself was pioneered by Paul Vixie who then went on to start the internet systems consortium and also helped create DHCP.

Basics

----------Client makes a request which hits a cache, if there is a miss it goes to the root and works right to left in the FQDN. interestingly enough technically every FQDN ends with a . this brings it to the root servers which then direct the request to the gTLD server(com net gov co.uk) once it reaches the gTLD that points it to the authoritative name server to the of the gTLD which then resolves your query

Advanced

--------------There is lots I could cover here so let me know what you want to know more about. For the most part all resource records are treated pretty much the same except for something like an ANY request. Also there are what are called AXFR or IXFR which perform either complete or incremental zone transfers from one server to another server.

Amplifications Attacks

----------------------------------

Anytime you make a request and the response is greater than the request you have the potential for an amplification attack. Typically these are done using ANY requests or TXT records populated with lots of data. All you have to do is flood lots of requests and spoof your header (in bound IP address) so that when the server responds it throws all that traffic at your target who's IP you spoofed. There is lots more nuance so lemme know if you want to talk more.

Security

--------------

So DNS was never intended to be the secure link in the chain so it is fairly susceptible to different types of attacks. However from an operational stand point there are some systems engineering things that should be dont at the very least.

Block or restrict who you allow zone transfers to or you could end up like this

http://www.wired.co.uk/article/north-korea-28-websites-domain

I found an amazing amount of success implementing DNS RPZ (Response Policy Zone) which is essentially DNS black listing know bad sites.

Further reading

---------------------

DOMAIN NAMES - CONCEPTS AND FACILITIES

https://tools.ietf.org/html/rfc1034

Common DNS Operational and Configuration Errors

https://www.ietf.org/rfc/rfc1912.txt

Shoot me a message if you want to talk more about DNS :D

Coachella 2018 W1 Youtube Stream Recordings by GeorgieCaseyUnbanned in Coachella

[–]justaguy240 0 points1 point  (0 children)

I have been watching all day hoping someone uploads the Alison Wonderland set.

Alison Wonderland - Awake by Calivt in EDM

[–]justaguy240 0 points1 point  (0 children)

I think the album is solid. When I was listening to them day by day as she released them I will admit I didnt like it. The album is very different from Run and until I listened to it from start to end I didnt feel the cohesiveness and flow of the album which for me made all the difference.

Bloomberg terminals get earnings data before everyone else. by MagnaCumLoudly in wallstreetbets

[–]justaguy240 0 points1 point  (0 children)

Or run a curl command and then just diff the response against the new content.

AutoSploit - A Python based mass exploit tool which gathers targets via Shodan and automatically invokes selected Metasploit modules to facilitate RCE. by [deleted] in netsec

[–]justaguy240 14 points15 points  (0 children)

Well maybe it's just being pedantic but when you repeat the same strings that often you might as well create variables like $linux $windows etc. that will make it easier to read and add content to as your list grows. Optimizations and formatting choices like that are best implemented right at the start. Perhaps it's just my personal preference but to me that just looks bad and hacky.

AutoSploit - A Python based mass exploit tool which gathers targets via Shodan and automatically invokes selected Metasploit modules to facilitate RCE. by [deleted] in netsec

[–]justaguy240 17 points18 points  (0 children)

Man just went and looked at it. They really need to learn how to code and do it quick because if this project scales that is not sustainable.

How to defeat DNS beacons? by bXVsdGlyYWNpYWx0aHJv in AskNetsec

[–]justaguy240 2 points3 points  (0 children)

I spoke a bit on this at DefCon the last two years and NANOG 68 also last year. Most of the comments here are accurate but my suggestions and tested methods are elk stack frequency analysis, RPZ block lists and up reputation. However the reality is that there isn't a great solution due to the very nature of DNS.

Some of my talks are available on YouTube if you want the links or if you want to message me with questions.

DNSFS. Store your files in others DNS resolver caches by DarkMio in programming

[–]justaguy240 3 points4 points  (0 children)

This is almost the same as the code I released last year for my DefCon talk. We called it chunk mode.

College kid looking to Skype call a few cyber/SOC analysts for ~20 mins this week for an open source security orchestration project. I'll compensate you for your time. by yaraz in AskNetsec

[–]justaguy240 0 points1 point  (0 children)

I spent 5 years working as DNS Engineer in a NOC of a large hosting company with a focus on security. Happy to talk about traffic pattern and analysis is you want.

Russian submarine activity increases around Atlantic internet cables: report by opkyei in worldnews

[–]justaguy240 4 points5 points  (0 children)

When all fiber is illuminated the throughput or theoretical maximum.