recentpopularlog in

dns

« earlier   
Do I leak?
Your digital footprint might be giving you away...
You might think your anonymity service protects you completely, but don’t get too cocky. If any trackable data is stored on your computer, or any traffic not completely routed through the anonymity network, you could be giving yourself away.

Just one leak is enough to link you back to your real IP and your real identity. Take our comprehensive test for a quick and dirty rundown of where you might be leaking.
DNS  security  VPN 
yesterday by rcyphers
DNS: Understanding The SOA Record | Peer Wisdom
If you make this too long, then name servers and resolvers will keep using their cached result even after all the secondary name servers have updated their zone files.  And there is no method available for you to force these name servers and resolvers to flush their cache.  Again, if your DNS server is compliant with RFC 2308, it only applies to negative responses.  But if not, then all resource records without an explicit TTL will use this value as the default TTL.  If you were to set this to 1 week (604800 seconds), then it could take up to a week for any change to finally be seen everywhere on the Internet.
dns 
yesterday by tinley
Singularity - A DNS Rebinding Attack Framework - KitPloit - PenTest Tools for your Security Arsenal ☣
DNS rebinding changes the IP address of an attacker controlled machine name to the IP address of a target application, bypassing the same-origin policy and thus allowing the browser to make arbitrary requests to the target application and read their responses. The Singularity DNS server is responding with short time to live (TTL) records, minimizing the time the response is cached. When the victim browses to the Singularity manager interface, the Singularity's DNS server first responds with the IP address of Singularity itself where the client-side code (payload) is hosted. When the DNS record times out, the Singularity DNS server responds with the IP address of the target host (e.g. 127.0.0.1) and the victim's browser can access the target application, circumventing the browser's same-origin policy.
dns  pentest  tool 
2 days ago by whip_lash
Top-Level Domains — Domainr
list of TLDs in one place, sorted

why is this hard to find?
dns  domains 
5 days ago by naveen

Copy this bookmark:





to read