dns

  1. Tomcat

    SecShow: Chinese monster attacks DNS

    What is the purpose of hackers and why do they use such unusual methods? Cybersecurity researchers have uncovered the activities of a Chinese group codenamed SecShow, which has been conducting global attacks through the domain name System (DNS) since June 2023. According to Infoblox experts...
  2. Tomcat

    Китайский актер SecShow проводит масштабное зондирование DNS в глобальном масштабе

    Исследователи кибербезопасности пролили больше света на китайского актера под кодовым названием SecShow, который, как было замечено, внедряет Систему доменных имен (DNS) в глобальном масштабе как минимум с июня 2023 года. Злоумышленник, по словам исследователей безопасности Infoblox доктора...
  3. Tomcat

    ВАРИАНТ ИСПОЛЬЗОВАНИЯ DNS: ГЕОГРАФИЧЕСКИЕ IP-ФИЛЬТРЫ И КАРДИНГ АТАКИ

    По мере роста использования Интернета растут и атаки на онлайн-бизнес. Это печальный побочный продукт технологии. К счастью, есть решения этой проблемы. Одним из таких методов являются фильтры GeoIP компании Constellix. Этот блог представляет собой тематическое исследование того, как один из...
  4. Father

    What is a DNS leak and how to fix it

    Article content: What is a DNS leak and what is the danger How to check for a DNS leak on your device Reasons and how to protect yourself from DNS leaks Incorrect proxy server configuration Using untrusted DNS servers Viruses or using unsafe apps Using a transparent proxy Top 3 Secure DNS...
  5. Father

    Features of the Windows 10 DNS Resolver and DNS Leak

    TL; DR: The DNS resolver in Windows 10 sends requests to all DNS server addresses known to the system in parallel, binding the request to the interface, and uses the response that came faster. If you use a DNS server from a local segment, this behavior allows your ISP or an attacker with a Wi-Fi...
  6. Father

    How hackers substitute DNS queries with the help of "poisoning" the cache

    Domain Name Server spoofing (DNS) is a cyberattack where an attacker directs the victim's traffic to a malicious site (instead of a legitimate IP address). Attackers use the method of" poisoning " the DNS cache to intercept Internet traffic and steal credentials or confidential information. DNS...
  7. Father

    DNS spying: Hackers actively monitor you over the Internet

    How did an ordinary network tool gradually turn into a powerful cyber weapon? Recently, hackers are increasingly using the DNS tunneling method to track when victims open phishing emails and click on malicious links, as well as to scan networks for vulnerabilities. DNS tunneling consists of...
  8. Father

    Kill Switch doesn't work: Android users are exposed to DNS query leaks

    The security of the "green robot" failed in a critical scenario. Android users experienced DNS query leaks when changing VPN servers, despite the "Always On VPN" and "Block Connections Without VPN"features enabled. The problem was detected in the latest version of the Android 14 operating...
  9. Father

    Связанный с Китаем "Muddling Meerkat" перехватывает DNS для отображения Интернета в глобальном масштабе

    С октября 2019 года было замечено, что ранее недокументированная киберугроза, получившая название Muddling Meerkat, предпринимает сложные действия в системе доменных имен (DNS) в вероятной попытке обойти меры безопасности и провести разведку сетей по всему миру. Компания по облачной...
  10. Father

    Muddling Meerkat: hackers from the Middle Kingdom take DNS under their control

    How did the Great Firewall of China become a weapon in the hands of cybercriminals? The hacker group, dubbed Muddling Meerkat by security researchers, has been using sophisticated domain name system (DNS) techniques to conduct intelligence activities on networks around the world since October...
  11. Teacher

    Microsoft introduces DNS tunneling by default in WSL 2.2.1

    This option allows you to bypass DNS packet blocking and improve network compatibility. The Microsoft released an update for the Windows Subsystem for Linux (WSL). The new version 2.2.1 includes DNS tunneling by default, which should improve network compatibility. Previously, DNS tunneling was...
  12. Brother

    PolarDNS: a new free DNS server for vulnerability research and pentest

    Will the tool play on the hackers side? Oryxlabs has developed a new free Python 3.x DNS server for cybersecurity and pentesting research, called PolarDNS. The server allows you to generate fully customizable DNS responses for testing various aspects of the DNS protocol, including server-side...
  13. Carding 4 Carders

    Microsoft introduces DNR: a feature designed to simplify the use of encrypted DNS protocols

    Insiders will be the first to appreciate the new feature, but it will soon be deployed to regular builds as well. Microsoft actively testing support for the Discovery of Network-designed Resolvers (DNR) standard in the latest insider builds of Windows 11. This Internet standard allows you to...
  14. Carding

    DNS in Danger: New 'MaginotDNS' Attack Threatens the Entire Internet

    Researchers have discovered an effective way to compromise top-level domains. A team of researchers from the University of California, Irvine and Tsinghua University has developed a powerful new cache poisoning attack called "MaginotDNS" that targets conditional DNS (CDNS) resolvers and can...
  15. Ajay9835

    What Is A Dns Leak And Why It Matters. [EXPLAINED]

    1) When using an anonymity or privacy service, it is extremely important that all traffic originating from your computer is routed through the anonymity network. 2) If any traffic flows outside of a secure connection to the network, any adversary controlling your traffic will be able to...
  16. BigBeast

    How to Change DNS?

    First of all we should understand WTF is this DNS ? DNS, or domain name system, is the internet protocol that turns human readable website names (such as carder.market) into machine readable numeric addresses. In some cases, you can improve browsing speed and/or improve your security by...
  17. Brother

    DNS cache poisoning. Description of technology, examples and method of protection.

    Despite the fact that DNS is one of the oldest protocols that is the mainstay of the entire Internet, it still does not use encryption and validation of records and responses. During DNS spoofing, records on the DNS server are changed in order to redirect traffic. DNS spoofing can be performed...
  18. Tomcat

    DNS Query Anonymity: Caching and Encryption

    Anyone who thinks about anonymity on the Internet knows a great way to hide their IP address on the Internet - this is a VPN service. However, even with a VPN connection, queries to the DNS server are often left unsecured, and you can easily track where your DNS queries are going. This is also...
  19. CarderPlanet

    Hackers hacked BlackWallet's DNS server and stole $ 400,000 in cryptocurrency

    Last weekend, unknown attackers compromised the BlackWallet DNS wallet (BlackWallet.co domain), which is used to work with the Stellar Lumen (XLM) cryptocurrency. The problem was noticed not only by service operators, but also by well-known information security specialist Kevin Beaumont...
  20. Tomcat

    Hide DNS

    Some people have problems with DNS. I also had it on Windows 7. When connecting to a VPN, the dns remained the same, but the ip changed. I googled and read articles, but everywhere it is written that you need to specify google dns or register a stub 127.0.0.1 (after it was registered, the...
Top