SlideShare a Scribd company logo
Domain
Data
into
Domain
Intellige
nce
Chris “tweedge”
Partridge
[~] whois -h
tweedge
▪ Founder of
dnstrace.pro
▪ Third year RIT CSEC
student and BSides
regular
▪ Runs Snort on own
network
▪ Guacamole aficionado
▪ Dungeons and Dragons
Contents
1.Quick Refresher on
DNS
2.The Reactive Threat
Intelligence Problem
3.Scraping and
Ingesting DNS Data at
Scale
4.Anomalies, Analysis
and General Findings
Quick
Refreshe
r on DNS
Section 0
BSides Rochester 2018: Chris Partridge: Turning Domain Data Into Domain Intelligence
DNS Basics
https://www.facebook.c
om/login/
▪ The protocol:
https://
▪ The page: /login/
▪ FQDN:
www.facebook.com
▫ TLD: com
Registrable domain:
What Can it
Tell You?
A IPv4 address
AAAA IPv6 address
ANY all records
CNAME canonical name
MX mailserver
NS nameserver
TXT text
And more...
How Does it
Work?
DNS is a hierarchical
system.
Y
o
u
Yo
ur
DN
S
Root
DNS
.com
DNS
Facebo
ok DNS
BSides Rochester 2018: Chris Partridge: Turning Domain Data Into Domain Intelligence
The
Reactive
Threat
Intellig
ence
Problem
Section 1
Reactive
Security !=
Great Security
▪ Consider 100% file-
signature-based
antimalware
▫ Easy to circumvent
▫ Difficult/costly to
maintain
▫ Slow to adapt
▪ Better than nothing?
¯_( ツ )_/¯
“
An IP address
earns a
negative
reputation
when
Symantec
detects
suspicious
activity, such
“
An IP address
earns a
negative
reputation
when
Symantec
detects
suspicious
activity, such
“
...If the IP
addresses
change
frequently,
and if the
site has an
IP address
that was
hosting
“
...If the IP
addresses
change
frequently,
and if the
site has an
IP address
that was
hosting
▪ Domain safety
heuristics are
available
▫ How recent the
registration was
▫ Frequent address
changes
▫ Popularity
estimates
It’s a Start
BSides Rochester 2018: Chris Partridge: Turning Domain Data Into Domain Intelligence
Relational
Learning
“To predict unforseen
or future relationships
between entities based
on past observations.”
Relational
Threat
Intelligence
Mal
ware
X
Interacts
with
C:UsersChri
s
Modifies
startup
settings
Loads
cryptographic
libraries
Outbound
HTTP GET
... nearly
limitless
characteristics ..
.
Relational
Threat
Intelligence
Doma
in X
Resolves to
certain IPsResolves to
certain other
domains
Was
registered by
_ registrar
Has certain
text records
... some other
characteristic
s ...
BSides Rochester 2018: Chris Partridge: Turning Domain Data Into Domain Intelligence
What Would We
Need?
▪ Huge quantities of
parsed domain data
▫ Some collect this
passively; we won’t
▫ Difficult to acquire
aggressively
▪ As much threat
intelligence as
possible
BSides Rochester 2018: Chris Partridge: Turning Domain Data Into Domain Intelligence
Scraping
and
Ingesting
DNS Data
at Scale
Section 2
Acquiring TLDs
http://data.iana.org/TL
D/tlds-alpha-by-
domain.txt
Stats:
▪ 1543 TLDs
▪ Available by HTTP
▪ Also by FTP
▪ Wow
Acquiring
Domains
▪ Buy access to
curated zone files
▫ ~$300/year ( ° °)╯ □ ╯ ︵
┻━┻
▪ Request access to
zone files from
registrars
▫ ICANN’s CZDS is a
good start
Discovering
Domains &
Subdomains
Out of
Scope
▪ Brute
force
▪ Website
crawling
▪ Search
engines &
passive
In Scope
▪ Probabilis
tic
lookups
▪ Reverse
DNS
▪ Using
DNSSEC:
NSEC and
Brute Force
Lookups
Recommended software:
shutdown -Ph now
Website
Crawling
▪ Find and follow links
▪ Complex and resource
intensive if the entire
document is rendered
for each page
▪ Requires a webserver
to be running
Search Engines
& Passive DNS
▪ Great for real-life
engagements, exposes
nothing about your
recon to a target
▪ Depends on external
services
Recommended software:
Probabilistic
Lookups
▪ Use a list of known
FQDNs and parse out
the most common
subdomains
▪ Combine with anything
you know about the
target (eg.
wordlists) to
increase
BSides Rochester 2018: Chris Partridge: Turning Domain Data Into Domain Intelligence
Reverse DNS
▪ Useful for IPv4
(dense), less useful
for IPv6 (sparse)
▪ Often results in ISP-
assigned FQDNs
▪ ...hrm.
DNSSEC
▪ A set of security
extensions for DNS
▪ Provides:
▫ Origin authentication
▫ Data integrity
▫ Denial of existence
BSides Rochester 2018: Chris Partridge: Turning Domain Data Into Domain Intelligence
NSEC Walks
▪ How does denial of
existence work with
DNSSEC?
▫ NS returns NSEC
response: “next secure
record”
Generally:
examp
le.com
api
ww
w
User
requests
“test”
NS
returns
BSides Rochester 2018: Chris Partridge: Turning Domain Data Into Domain Intelligence
1624 IN NSEC
www.example.com.
A NS SOA TXT AAAA
RRSIG NSEC DNSKEY
BSides Rochester 2018: Chris Partridge: Turning Domain Data Into Domain Intelligence
NSEC3 Walks
▪ Privacy improvements in
2008 to DNSSEC,
creating NSEC3 records
by hashing adjacent
valid records
Generally:
examp
le.com
api
ww
w
User requests “test”
NS returns NSEC3
record stating:
“There is nothing between
‘71f64b...’ and ‘724611...’”
BSides Rochester 2018: Chris Partridge: Turning Domain Data Into Domain Intelligence
BSides Rochester 2018: Chris Partridge: Turning Domain Data Into Domain Intelligence
BSides Rochester 2018: Chris Partridge: Turning Domain Data Into Domain Intelligence
DNSSEC, NSEC,
NSEC3 Recap
▪ If a target has
DNSSEC enabled it’s
absolutely worth
investigating an
NSEC(3) walk
▪ NSEC scales well,
NSEC3 does not (on
CPU)
▪ NSEC5 on the way
Zone Transfers
(AXFR Query)
▪ Ask the nameserver
politely for all its
zone data
▪ Between 1/7 and 1/10
nameservers allow
AXFR
▪ Requires little effort
for possibly large
payout
North Korea
DNS Leak
Found by
mandatoryprogrammer/
TLDR
Sept. 2016, 28 domains:
airkoryo.com.kp, cooks.org.kp,
friend.com.kp, gnu.rep.kp,
kass.org.kp, kcna.kp,
kiyctc.com.kp, knic.com.kp,
koredufund.org.kp,
korelcfund.org.kp,
BSides Rochester 2018: Chris Partridge: Turning Domain Data Into Domain Intelligence
BSides Rochester 2018: Chris Partridge: Turning Domain Data Into Domain Intelligence
Resolving the
Domain Space
▪ The DIY solution
1.Try an AXFR (if
applicable)
2.Try an ANY query
3.Iterate through
desired query types
▪ Thread and
geographically
distribute
Make Use of
Open Domain
Data
Rapid7 Sonar
▪ SSL, Forward DNS, and
Reverse DNS = great
▪ Approx. 2.3 billion
data points per week
in FDNS
▪ Permits non-malicious
noncommercial use
Storing
Everything
▪ Decompose everything
▪ Use scalable database
engines
▫ Current setup:
Percona 5.6 with
TokuDB
▪ Compression works
wonders
▪ Indexes are your
BSides Rochester 2018: Chris Partridge: Turning Domain Data Into Domain Intelligence
Anomalie
s,
Analysis,
and
General
Findings
Section 3
Domain Errors
▪ a104-100-169-
118.depl1521945933
▪ sxevz.www.ae01521990
153
▪ dc-wpprod-f5
▪ nic.llc
▪ mac.sport
LLC Isn’t a
TLD? Sport?
▪ IANA says yes:
▪ Mozilla’s Public
Suffix List says no:
Here We Go!
Invalid Types
▪ a104-100-169-
118.depl1521945933
Type: ec2-52-39-
231 ..., reply: a
▪ dc-wpprod-f5
Type: canam.ws,
reply: a
IPv4 / DNS A
IPv6 vs IPv4
CNAME Mistakes
▪ http://exmail.qq.com/
login
▪ ms28789472.msv1.inval
id
▪ 6ca0fe83df737a7b1a6
003830fc47008
▪ www.tuolongledcom
▪ fdfddfdf.343sdfd.fddd
MX and NS
Errors
Achieving
Proactiv
e
Intellig
ence
Section 4
Adding Threat
Intelligence
▪ Ingest as many lists
as possible
▫ Phishing feeds of
URLs
▫ Domain reputation
feeds
▫ IP reputation feeds
▫ BOGONs
▪ Considering heuristics
Tuning Threat
Intelligence
▪ Threat intel source
reputation
▪ Threat type and
severity
▪ User bias based on
threat category
BSides Rochester 2018: Chris Partridge: Turning Domain Data Into Domain Intelligence
BSides Rochester 2018: Chris Partridge: Turning Domain Data Into Domain Intelligence
BSides Rochester 2018: Chris Partridge: Turning Domain Data Into Domain Intelligence
BSides Rochester 2018: Chris Partridge: Turning Domain Data Into Domain Intelligence
BSides Rochester 2018: Chris Partridge: Turning Domain Data Into Domain Intelligence
BSides Rochester 2018: Chris Partridge: Turning Domain Data Into Domain Intelligence
BSides Rochester 2018: Chris Partridge: Turning Domain Data Into Domain Intelligence
Limitatio
ns and
Future
Improve
ments
Section 5
Limitations
▪ Data is far from
complete at the
moment
▪ Threat intelligence
sources are good, not
great
▫ Response time to
emerging threats is
slow
Limitations
Future
Improvements
▪ Talk to a lawyer
▪ Scale out, cover more
geographic areas,
increase query
throughput
▫ You can help!
▪ Implement
distributed NSEC
walking, AXFRs
The Endgame
▪ Make dnstrace a
proactive tool for
geeks
▫ Generate firewall
configurations
▫ Generate DNS
blocklists
▪ Make dnstrace a
proactive tool for
Open
Discussio
n
Section 6
Questio
ns?
Commen
ts?
This is the Last
Slide-
Thank you so much for
coming to my talk!
Keep in touch via ...
Email
chris@partridge.tech
LinkedIn /in/tweedge/
GitHub? @tweedge
Ad

More Related Content

What's hot (20)

A study of our DNS full-resolvers
A study of our DNS full-resolversA study of our DNS full-resolvers
A study of our DNS full-resolvers
Bangladesh Network Operators Group
 
Caching Up and Down the Stack
Caching Up and Down the StackCaching Up and Down the Stack
Caching Up and Down the Stack
Dan Kuebrich
 
The KNOT DNS Server
The KNOT DNS ServerThe KNOT DNS Server
The KNOT DNS Server
Men and Mice
 
The CAA-Record for increased encryption security
The CAA-Record for increased encryption securityThe CAA-Record for increased encryption security
The CAA-Record for increased encryption security
Men and Mice
 
DNSTap Webinar
DNSTap WebinarDNSTap Webinar
DNSTap Webinar
Men and Mice
 
Back to Basics Spanish Webinar 3 - Introducción a los replica sets
Back to Basics Spanish Webinar 3 - Introducción a los replica setsBack to Basics Spanish Webinar 3 - Introducción a los replica sets
Back to Basics Spanish Webinar 3 - Introducción a los replica sets
MongoDB
 
distributed tracing in 5 minutes
distributed tracing in 5 minutesdistributed tracing in 5 minutes
distributed tracing in 5 minutes
Dan Kuebrich
 
Network Security Best Practice (BCP38 & 140)
Network Security Best Practice (BCP38 & 140) Network Security Best Practice (BCP38 & 140)
Network Security Best Practice (BCP38 & 140)
Bangladesh Network Operators Group
 
Back to Basics Spanish 4 Introduction to sharding
Back to Basics Spanish 4 Introduction to shardingBack to Basics Spanish 4 Introduction to sharding
Back to Basics Spanish 4 Introduction to sharding
MongoDB
 
RIPE 70 Report Webinar
RIPE 70 Report WebinarRIPE 70 Report Webinar
RIPE 70 Report Webinar
Men and Mice
 
Forensics perspective ERFA-møde marts 2017
 Forensics perspective ERFA-møde marts 2017 Forensics perspective ERFA-møde marts 2017
Forensics perspective ERFA-møde marts 2017
J Hartig
 
Fighting Abuse with DNS
Fighting Abuse with DNSFighting Abuse with DNS
Fighting Abuse with DNS
Men and Mice
 
Mongo db intro new
Mongo db intro newMongo db intro new
Mongo db intro new
Abhinav Dhasmana
 
Windows Server 2016 Webinar
Windows Server 2016 WebinarWindows Server 2016 Webinar
Windows Server 2016 Webinar
Men and Mice
 
What is new in BIND 9.11?
What is new in BIND 9.11?What is new in BIND 9.11?
What is new in BIND 9.11?
Men and Mice
 
Efficient cluster resource management by using Cook and Mesos / Li Jin (Two S...
Efficient cluster resource management by using Cook and Mesos / Li Jin (Two S...Efficient cluster resource management by using Cook and Mesos / Li Jin (Two S...
Efficient cluster resource management by using Cook and Mesos / Li Jin (Two S...
Ontico
 
ION Tokyo: The Business Case for DNSSEC and DANE, Dan York
ION Tokyo: The Business Case for DNSSEC and DANE, Dan YorkION Tokyo: The Business Case for DNSSEC and DANE, Dan York
ION Tokyo: The Business Case for DNSSEC and DANE, Dan York
Deploy360 Programme (Internet Society)
 
Root servers
Root serversRoot servers
Root servers
Willem Kuypers
 
Back to Basics Webinar 6: Production Deployment
Back to Basics Webinar 6: Production DeploymentBack to Basics Webinar 6: Production Deployment
Back to Basics Webinar 6: Production Deployment
MongoDB
 
MongoDB memory management demystified
MongoDB memory management demystifiedMongoDB memory management demystified
MongoDB memory management demystified
Alon Horev
 
Caching Up and Down the Stack
Caching Up and Down the StackCaching Up and Down the Stack
Caching Up and Down the Stack
Dan Kuebrich
 
The KNOT DNS Server
The KNOT DNS ServerThe KNOT DNS Server
The KNOT DNS Server
Men and Mice
 
The CAA-Record for increased encryption security
The CAA-Record for increased encryption securityThe CAA-Record for increased encryption security
The CAA-Record for increased encryption security
Men and Mice
 
Back to Basics Spanish Webinar 3 - Introducción a los replica sets
Back to Basics Spanish Webinar 3 - Introducción a los replica setsBack to Basics Spanish Webinar 3 - Introducción a los replica sets
Back to Basics Spanish Webinar 3 - Introducción a los replica sets
MongoDB
 
distributed tracing in 5 minutes
distributed tracing in 5 minutesdistributed tracing in 5 minutes
distributed tracing in 5 minutes
Dan Kuebrich
 
Back to Basics Spanish 4 Introduction to sharding
Back to Basics Spanish 4 Introduction to shardingBack to Basics Spanish 4 Introduction to sharding
Back to Basics Spanish 4 Introduction to sharding
MongoDB
 
RIPE 70 Report Webinar
RIPE 70 Report WebinarRIPE 70 Report Webinar
RIPE 70 Report Webinar
Men and Mice
 
Forensics perspective ERFA-møde marts 2017
 Forensics perspective ERFA-møde marts 2017 Forensics perspective ERFA-møde marts 2017
Forensics perspective ERFA-møde marts 2017
J Hartig
 
Fighting Abuse with DNS
Fighting Abuse with DNSFighting Abuse with DNS
Fighting Abuse with DNS
Men and Mice
 
Windows Server 2016 Webinar
Windows Server 2016 WebinarWindows Server 2016 Webinar
Windows Server 2016 Webinar
Men and Mice
 
What is new in BIND 9.11?
What is new in BIND 9.11?What is new in BIND 9.11?
What is new in BIND 9.11?
Men and Mice
 
Efficient cluster resource management by using Cook and Mesos / Li Jin (Two S...
Efficient cluster resource management by using Cook and Mesos / Li Jin (Two S...Efficient cluster resource management by using Cook and Mesos / Li Jin (Two S...
Efficient cluster resource management by using Cook and Mesos / Li Jin (Two S...
Ontico
 
Back to Basics Webinar 6: Production Deployment
Back to Basics Webinar 6: Production DeploymentBack to Basics Webinar 6: Production Deployment
Back to Basics Webinar 6: Production Deployment
MongoDB
 
MongoDB memory management demystified
MongoDB memory management demystifiedMongoDB memory management demystified
MongoDB memory management demystified
Alon Horev
 

Similar to BSides Rochester 2018: Chris Partridge: Turning Domain Data Into Domain Intelligence (20)

DNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael CasadevallDNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael Casadevall
Glenn McKnight
 
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
APNIC
 
DNS in IR: Collection, Analysis and Response
DNS in IR: Collection, Analysis and ResponseDNS in IR: Collection, Analysis and Response
DNS in IR: Collection, Analysis and Response
pm123008
 
Leveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker ActivityLeveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker Activity
Sqrrl
 
DNSDiag - Then and Now (9 years in life of a FOSS Project)
DNSDiag - Then and Now (9 years in life of a FOSS Project)DNSDiag - Then and Now (9 years in life of a FOSS Project)
DNSDiag - Then and Now (9 years in life of a FOSS Project)
Babak Farrokhi
 
DNS Attacks
DNS AttacksDNS Attacks
DNS Attacks
Himanshu Prabhakar
 
DNS как линия защиты/DNS as a Defense Vector
DNS как линия защиты/DNS as a Defense VectorDNS как линия защиты/DNS as a Defense Vector
DNS как линия защиты/DNS as a Defense Vector
Positive Hack Days
 
Hands-on DNSSEC Deployment
Hands-on DNSSEC DeploymentHands-on DNSSEC Deployment
Hands-on DNSSEC Deployment
Bangladesh Network Operators Group
 
DNS RPZ in action HoW IS DNS DIFFERET.pptx
DNS RPZ in action HoW IS DNS DIFFERET.pptxDNS RPZ in action HoW IS DNS DIFFERET.pptx
DNS RPZ in action HoW IS DNS DIFFERET.pptx
ssuser195cee
 
DEF CON 27 - GERALD DOUSSOT AND ROGER MEYER - state of dns rebinding attack ...
DEF CON 27 - GERALD DOUSSOT  AND ROGER MEYER - state of dns rebinding attack ...DEF CON 27 - GERALD DOUSSOT  AND ROGER MEYER - state of dns rebinding attack ...
DEF CON 27 - GERALD DOUSSOT AND ROGER MEYER - state of dns rebinding attack ...
Felipe Prado
 
A @textfiles approach to gathering the world's DNS
A @textfiles approach to gathering the world's DNSA @textfiles approach to gathering the world's DNS
A @textfiles approach to gathering the world's DNS
Rob Fuller
 
2 technical-dns-workshop-day1
2 technical-dns-workshop-day12 technical-dns-workshop-day1
2 technical-dns-workshop-day1
DNS Entrepreneurship Center
 
Domain Name System (DNS) Fundamentals
Domain Name System (DNS) FundamentalsDomain Name System (DNS) Fundamentals
Domain Name System (DNS) Fundamentals
WebSniffer
 
Signing DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutionsSigning DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutions
APNIC
 
DNS Security
DNS SecurityDNS Security
DNS Security
johnmcclure00
 
Tools kali
Tools kaliTools kali
Tools kali
ketban0702
 
dns-sec-4-slides
dns-sec-4-slidesdns-sec-4-slides
dns-sec-4-slides
kj teoh
 
DNS Fundamentals Presentation_PANDI-2022.pdf
DNS Fundamentals Presentation_PANDI-2022.pdfDNS Fundamentals Presentation_PANDI-2022.pdf
DNS Fundamentals Presentation_PANDI-2022.pdf
roemahtoedjoeh
 
ION Islamabad - Deploying DNSSEC
ION Islamabad - Deploying DNSSECION Islamabad - Deploying DNSSEC
ION Islamabad - Deploying DNSSEC
Deploy360 Programme (Internet Society)
 
DNS Survival Guide.
DNS Survival Guide.DNS Survival Guide.
DNS Survival Guide.
Qrator Labs
 
DNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael CasadevallDNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael Casadevall
Glenn McKnight
 
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
APNIC
 
DNS in IR: Collection, Analysis and Response
DNS in IR: Collection, Analysis and ResponseDNS in IR: Collection, Analysis and Response
DNS in IR: Collection, Analysis and Response
pm123008
 
Leveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker ActivityLeveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker Activity
Sqrrl
 
DNSDiag - Then and Now (9 years in life of a FOSS Project)
DNSDiag - Then and Now (9 years in life of a FOSS Project)DNSDiag - Then and Now (9 years in life of a FOSS Project)
DNSDiag - Then and Now (9 years in life of a FOSS Project)
Babak Farrokhi
 
DNS как линия защиты/DNS as a Defense Vector
DNS как линия защиты/DNS as a Defense VectorDNS как линия защиты/DNS as a Defense Vector
DNS как линия защиты/DNS as a Defense Vector
Positive Hack Days
 
DNS RPZ in action HoW IS DNS DIFFERET.pptx
DNS RPZ in action HoW IS DNS DIFFERET.pptxDNS RPZ in action HoW IS DNS DIFFERET.pptx
DNS RPZ in action HoW IS DNS DIFFERET.pptx
ssuser195cee
 
DEF CON 27 - GERALD DOUSSOT AND ROGER MEYER - state of dns rebinding attack ...
DEF CON 27 - GERALD DOUSSOT  AND ROGER MEYER - state of dns rebinding attack ...DEF CON 27 - GERALD DOUSSOT  AND ROGER MEYER - state of dns rebinding attack ...
DEF CON 27 - GERALD DOUSSOT AND ROGER MEYER - state of dns rebinding attack ...
Felipe Prado
 
A @textfiles approach to gathering the world's DNS
A @textfiles approach to gathering the world's DNSA @textfiles approach to gathering the world's DNS
A @textfiles approach to gathering the world's DNS
Rob Fuller
 
Domain Name System (DNS) Fundamentals
Domain Name System (DNS) FundamentalsDomain Name System (DNS) Fundamentals
Domain Name System (DNS) Fundamentals
WebSniffer
 
Signing DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutionsSigning DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutions
APNIC
 
dns-sec-4-slides
dns-sec-4-slidesdns-sec-4-slides
dns-sec-4-slides
kj teoh
 
DNS Fundamentals Presentation_PANDI-2022.pdf
DNS Fundamentals Presentation_PANDI-2022.pdfDNS Fundamentals Presentation_PANDI-2022.pdf
DNS Fundamentals Presentation_PANDI-2022.pdf
roemahtoedjoeh
 
DNS Survival Guide.
DNS Survival Guide.DNS Survival Guide.
DNS Survival Guide.
Qrator Labs
 
Ad

More from JosephTesta9 (12)

BSides Rochester 2018: Chaim Sanders: Easily Deploying and Optimizing Open So...
BSides Rochester 2018: Chaim Sanders: Easily Deploying and Optimizing Open So...BSides Rochester 2018: Chaim Sanders: Easily Deploying and Optimizing Open So...
BSides Rochester 2018: Chaim Sanders: Easily Deploying and Optimizing Open So...
JosephTesta9
 
BSides Rochester 2018: Chaim Sanders: How the Cookie Crumbles: Modern HTTP St...
BSides Rochester 2018: Chaim Sanders: How the Cookie Crumbles: Modern HTTP St...BSides Rochester 2018: Chaim Sanders: How the Cookie Crumbles: Modern HTTP St...
BSides Rochester 2018: Chaim Sanders: How the Cookie Crumbles: Modern HTTP St...
JosephTesta9
 
BSides Rochester 2018: Justin Moore: Automated HTTP Request Repeating With Bu...
BSides Rochester 2018: Justin Moore: Automated HTTP Request Repeating With Bu...BSides Rochester 2018: Justin Moore: Automated HTTP Request Repeating With Bu...
BSides Rochester 2018: Justin Moore: Automated HTTP Request Repeating With Bu...
JosephTesta9
 
BSides Rochester 2018: Dave Kukfa: BinDbg: Easy Windows Debugging for Binary ...
BSides Rochester 2018: Dave Kukfa: BinDbg: Easy Windows Debugging for Binary ...BSides Rochester 2018: Dave Kukfa: BinDbg: Easy Windows Debugging for Binary ...
BSides Rochester 2018: Dave Kukfa: BinDbg: Easy Windows Debugging for Binary ...
JosephTesta9
 
BSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open Source
BSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open SourceBSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open Source
BSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open Source
JosephTesta9
 
BSides Rochester 2018: Michael West: Sentry, Or: How I Learned To Stop Worryi...
BSides Rochester 2018: Michael West: Sentry, Or: How I Learned To Stop Worryi...BSides Rochester 2018: Michael West: Sentry, Or: How I Learned To Stop Worryi...
BSides Rochester 2018: Michael West: Sentry, Or: How I Learned To Stop Worryi...
JosephTesta9
 
BSides Rochester 2018: Lee Kagan: Red and Blue Ping Pong
BSides Rochester 2018: Lee Kagan: Red and Blue Ping PongBSides Rochester 2018: Lee Kagan: Red and Blue Ping Pong
BSides Rochester 2018: Lee Kagan: Red and Blue Ping Pong
JosephTesta9
 
BSides Rochester 2018: Jonathan Myers: IoT Malware Detection with Machine Lea...
BSides Rochester 2018: Jonathan Myers: IoT Malware Detection with Machine Lea...BSides Rochester 2018: Jonathan Myers: IoT Malware Detection with Machine Lea...
BSides Rochester 2018: Jonathan Myers: IoT Malware Detection with Machine Lea...
JosephTesta9
 
BSides Rochester 2018: Issa Hafiri & Christian Halbert: IOT Devices (And Why ...
BSides Rochester 2018: Issa Hafiri & Christian Halbert: IOT Devices (And Why ...BSides Rochester 2018: Issa Hafiri & Christian Halbert: IOT Devices (And Why ...
BSides Rochester 2018: Issa Hafiri & Christian Halbert: IOT Devices (And Why ...
JosephTesta9
 
BSides Rochester 2018: Esteban Rodriguez: Ducky In The Middle: Injecting keys...
BSides Rochester 2018: Esteban Rodriguez: Ducky In The Middle: Injecting keys...BSides Rochester 2018: Esteban Rodriguez: Ducky In The Middle: Injecting keys...
BSides Rochester 2018: Esteban Rodriguez: Ducky In The Middle: Injecting keys...
JosephTesta9
 
BSides Rochester 2018: Drew Kirkpatrick: Open Source SAST and DAST Tools for ...
BSides Rochester 2018: Drew Kirkpatrick: Open Source SAST and DAST Tools for ...BSides Rochester 2018: Drew Kirkpatrick: Open Source SAST and DAST Tools for ...
BSides Rochester 2018: Drew Kirkpatrick: Open Source SAST and DAST Tools for ...
JosephTesta9
 
BSides Rochester 2018: Anthony DiDonato: Virtualization Based Security
BSides Rochester 2018: Anthony DiDonato: Virtualization Based SecurityBSides Rochester 2018: Anthony DiDonato: Virtualization Based Security
BSides Rochester 2018: Anthony DiDonato: Virtualization Based Security
JosephTesta9
 
BSides Rochester 2018: Chaim Sanders: Easily Deploying and Optimizing Open So...
BSides Rochester 2018: Chaim Sanders: Easily Deploying and Optimizing Open So...BSides Rochester 2018: Chaim Sanders: Easily Deploying and Optimizing Open So...
BSides Rochester 2018: Chaim Sanders: Easily Deploying and Optimizing Open So...
JosephTesta9
 
BSides Rochester 2018: Chaim Sanders: How the Cookie Crumbles: Modern HTTP St...
BSides Rochester 2018: Chaim Sanders: How the Cookie Crumbles: Modern HTTP St...BSides Rochester 2018: Chaim Sanders: How the Cookie Crumbles: Modern HTTP St...
BSides Rochester 2018: Chaim Sanders: How the Cookie Crumbles: Modern HTTP St...
JosephTesta9
 
BSides Rochester 2018: Justin Moore: Automated HTTP Request Repeating With Bu...
BSides Rochester 2018: Justin Moore: Automated HTTP Request Repeating With Bu...BSides Rochester 2018: Justin Moore: Automated HTTP Request Repeating With Bu...
BSides Rochester 2018: Justin Moore: Automated HTTP Request Repeating With Bu...
JosephTesta9
 
BSides Rochester 2018: Dave Kukfa: BinDbg: Easy Windows Debugging for Binary ...
BSides Rochester 2018: Dave Kukfa: BinDbg: Easy Windows Debugging for Binary ...BSides Rochester 2018: Dave Kukfa: BinDbg: Easy Windows Debugging for Binary ...
BSides Rochester 2018: Dave Kukfa: BinDbg: Easy Windows Debugging for Binary ...
JosephTesta9
 
BSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open Source
BSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open SourceBSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open Source
BSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open Source
JosephTesta9
 
BSides Rochester 2018: Michael West: Sentry, Or: How I Learned To Stop Worryi...
BSides Rochester 2018: Michael West: Sentry, Or: How I Learned To Stop Worryi...BSides Rochester 2018: Michael West: Sentry, Or: How I Learned To Stop Worryi...
BSides Rochester 2018: Michael West: Sentry, Or: How I Learned To Stop Worryi...
JosephTesta9
 
BSides Rochester 2018: Lee Kagan: Red and Blue Ping Pong
BSides Rochester 2018: Lee Kagan: Red and Blue Ping PongBSides Rochester 2018: Lee Kagan: Red and Blue Ping Pong
BSides Rochester 2018: Lee Kagan: Red and Blue Ping Pong
JosephTesta9
 
BSides Rochester 2018: Jonathan Myers: IoT Malware Detection with Machine Lea...
BSides Rochester 2018: Jonathan Myers: IoT Malware Detection with Machine Lea...BSides Rochester 2018: Jonathan Myers: IoT Malware Detection with Machine Lea...
BSides Rochester 2018: Jonathan Myers: IoT Malware Detection with Machine Lea...
JosephTesta9
 
BSides Rochester 2018: Issa Hafiri & Christian Halbert: IOT Devices (And Why ...
BSides Rochester 2018: Issa Hafiri & Christian Halbert: IOT Devices (And Why ...BSides Rochester 2018: Issa Hafiri & Christian Halbert: IOT Devices (And Why ...
BSides Rochester 2018: Issa Hafiri & Christian Halbert: IOT Devices (And Why ...
JosephTesta9
 
BSides Rochester 2018: Esteban Rodriguez: Ducky In The Middle: Injecting keys...
BSides Rochester 2018: Esteban Rodriguez: Ducky In The Middle: Injecting keys...BSides Rochester 2018: Esteban Rodriguez: Ducky In The Middle: Injecting keys...
BSides Rochester 2018: Esteban Rodriguez: Ducky In The Middle: Injecting keys...
JosephTesta9
 
BSides Rochester 2018: Drew Kirkpatrick: Open Source SAST and DAST Tools for ...
BSides Rochester 2018: Drew Kirkpatrick: Open Source SAST and DAST Tools for ...BSides Rochester 2018: Drew Kirkpatrick: Open Source SAST and DAST Tools for ...
BSides Rochester 2018: Drew Kirkpatrick: Open Source SAST and DAST Tools for ...
JosephTesta9
 
BSides Rochester 2018: Anthony DiDonato: Virtualization Based Security
BSides Rochester 2018: Anthony DiDonato: Virtualization Based SecurityBSides Rochester 2018: Anthony DiDonato: Virtualization Based Security
BSides Rochester 2018: Anthony DiDonato: Virtualization Based Security
JosephTesta9
 
Ad

Recently uploaded (20)

Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 

BSides Rochester 2018: Chris Partridge: Turning Domain Data Into Domain Intelligence

Editor's Notes

  • #4: No questions section at the end re: not an expert. I’m on the mailing list, but this is a discussion, not a lecture.
  • #6: I know, nobody really likes DNS. me neither.
  • #7: Strip away request data to get at the parts of a domain
  • #9: DNS hierarchy - a given NS only knows about itself and its delegates. None are obligated to expose information that isn’t being requested. Replace text-heavy slide with diagram
  • #10: With the talk about the basics over - what does security in the DNS space look like?
  • #13: When was this from? What does it mean?
  • #14: ouch
  • #15: Getting better? When/where/who?
  • #16: Even Talos is making reactive decisions, but this time supplemented with proactive heuristics
  • #17: Reasonable heuristics can help protect people - ok, great. It’s a start. But we don’t have that many heuristics to work with. What about a dynamic address so Bob can access his nextcloud at home?
  • #19: Requires complex, relational structureAllows for link-based clusteringLower dimensionality and high similarity tend to make systems more effective
  • #20: Too many characteristics to prove effective for clustering - though specific characteristics and sets of characteristics are classifiable, thus, heuristics
  • #21: Finite set of characteristics, strong structure of both nodes and characteristics.
  • #22: We could give it a go
  • #26: TLDs are easy. TLD holders want you to know that their TLD exists for marketing reasons, technical reasons (parsing), etc
  • #27: Generally for enumerating domains people buy access to zone files
  • #28: I’ll make recommendations for discovering out of scope things, and demo discovering in-scope things
  • #29: Absolutely not. Good lawyer can make it sound like a DoS attack. Especially bad at scale. Read: DDoS.
  • #30: Limits search to web-only domains, out of scope for the intended function of DNS. Useful in other situations. Lots of options.
  • #31: Good for limited IRL engagements, can’t perform this at scale due to blacklisting
  • #32: Can be used with certain limitations at scale. Example assumes randomized brute force search of strlen<=6 at 50% completion using only alpha charset - numbers, dashes, etc. would greatly expand search space
  • #34: We can usually tell the ISP by AS allocations anyway, but whatever
  • #35: Implements several new records types including dnskey, rrsig, nsec... dnssec-secured responses can be verified to be signed by the NS, valid, and to prevent an ISP just intercepting/nulling dns responses there is authenticated denial of existence.
  • #36: Denial of existence you say... how does that work?
  • #37: Replies with an NSEC record. There is not a standard for NSEC records beyond “the next record signed by the nameserver” but this typically means (in most implementations) the next record that exists/returns data.
  • #38: hmmmmmmmm
  • #39: There you have it, example.com replies with the next valid domain. So we can enumerate.
  • #40: But example.com is too small. Let’s enumerate the DNS footprint of something bigger... say, PayPal. 689 queries. That’s an 80-char wide window, longest subdomain I saw was ~30 chars, so 7 * 10^55 is a good estimate of the 50% brute force space. ONE SEPT-EN-DEC-ILLION TIMES as many queries.
  • #41: People realized the former was a bad idea and came up with NSEC3, the big change being hashed subdomain results
  • #42: You can see we get gibberish back - no easy walks to be found here. But that’s not to say they’re not possible - you can collect a list of those hashes and then feed them into a cracking software
  • #43: Here’s an NSEC3 walk of the .pro TLD - in several seconds we crack 11% of domains using hashcat on a Xeon L5640 CPU with a very bad mask. With a last-gen GPU cracking system and a better mask or wordlist, we could push much higher coverage with little extra investment
  • #44: Cloudflare’s “DNSSEC done right.” NSEC doesn’t have to be the next existing domain - just has to be the next signed record. So CF generates garbage records to prevent a walk.
  • #45: Four our project we’d need to create failure cases. NSEC5 prevents enumeration - it’s available but not really used right now
  • #46: Should not be enabled for production environments. 1/7 numbers from dns arc, marjorie @ ic3. 1/10 is approx. lower bound what I’ve seen so far. Reveals activity beyond reasonable doubt to any DNS admin checking the logs though.
  • #48: Demo axfr - lots of content. We don’t just get a list of valid domains/subdomains - we get query types and responses too. neat!
  • #49: We now have a lot of ways of acquiring FQDNs - but we’ve only scratched the surface of resolving that domain space
  • #50: AXFR first - very little effort to enumerate an entire zone, try it against any registrable domain. Failing that, ANY (since we want all the data). Some service providers are refusing ANY, generally due to complexity and DoS amp. Re: cloudflare. Failing that, iterate through most-wanted types (A, AAAA, CNAME, MX, NS, etc.). We thread heavily and maintain 20 nodes in 6 countries and 3 continents.
  • #51: Really no reason not to if you’re doing this at the scale we are noncomercially. More scans = more granular data = better maps.
  • #52: Decompose for faster querying. Much worse performance and utility to select where “10.%” to find everything in the 10.0.0.0/8 space. Useful to have everything that can be an integer represented as an integer, and even FQDNs parsed out into subsections
  • #53: Not that we have the data we need, let’s start playing with it.
  • #56: Filing an issue
  • #58: Hmmmmmm
  • #59: 0.1% of addresses went to private or loopback addresses - doesn’t seem like much until you consider that’s about 1.2 million addresses. Here’s the breakdown. An additional 0.01% of addresses resolve to 1.1.1.1, so APNIC was right to lend that address to Cloudflare.
  • #61: Protocol doesn’t belong here, .invalid???, a series of CNAMEs with the same hash-like value, simple errors, keyboard smash????
  • #62: Localhost is not, in fact, a valid MX or NS record
  • #64: Phishing: eg openphish, domain reputation: eg spamhaus, IP rep: eg everything in firehol, BOGONs from team cymru
  • #65: Assign trust ratings based on common criteria to all threat intelligence lists. User bias is a multiplier so they can quickly zero out things not relevant to them (eg. if they don’t mind ads, or want to access a certain cove of ragged sailors)
  • #66: A map of a hosting provider, beget.tech
  • #67: I wouldn’t trust that adobe update, would you?
  • #68: Heroku, 000webhost
  • #69: Harder decisions - some things will get caught, so we need to find ways to minimize false positives - eg. integrating heuristics for false positive reduction
  • #71: AWS but limited
  • #72: GitHub but limited
  • #74: Considering making some visualizations for estimating our current coverage
  • #75: Lots of querying power in few areas
  • #76: Could show map of where we have nodes
  • #77: This is the end goal - not to just have an investigative tool but a utility that can help people be secure at a domain level with a level of precision and proactivity that has not been executed before.