101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

491
active users

#dns

28 posts25 participants1 post today
arXiv logo
arXiv.orgTowards a Non-Binary View of IPv6 AdoptionTwelve years have passed since World IPv6 Launch Day, but what is the current state of IPv6 deployment? Prior work has examined IPv6 status as a binary: can you use IPv6, or not? As deployment increases we must consider a more nuanced, non-binary perspective on IPv6: how much and often can a user or a service use IPv6? We consider this question as a client, server, and cloud provider. Considering the client's perspective, we observe user traffic. We see that the fraction of IPv6 traffic a user sends varies greatly, both across users and day-by-day, with a standard deviation of over 15%. We show this variation occurs for two main reasons. First, IPv6 traffic is primarily human-generated, thus showing diurnal patterns. Second, some services are IPv6-forward and others IPv6-laggards, so as users do different things their fraction of IPv6 varies. We look at server-side IPv6 adoption in two ways. First, we expand analysis of web services to examine how many are only partially IPv6 enabled due to their reliance on IPv4-only resources. Our findings reveal that only 12.5% of top 100k websites qualify as fully IPv6-ready. Finally, we examine cloud support for IPv6. Although all clouds and CDNs support IPv6, we find that tenant deployment rates vary significantly across providers. We find that ease of enabling IPv6 in the cloud is correlated with tenant IPv6 adoption rates, and recommend best practices for cloud providers to improve IPv6 adoption. Our results suggest IPv6 deployment is growing, but many services lag, presenting a potential for improvement.

#DNS question: when you transfer a domain name from one provider (registrar ?) to another, does the "expire date" is kept untouched or reset to 1 year?

DNS: A Small but Effective C2 system

This analysis explores the exploitation of DNS for command-and-control operations and data exfiltration. It details how cybercriminals leverage DNS tunneling to create covert communication channels, bypassing traditional security measures. The article examines various DNS tunneling families, including Cobalt Strike, DNSCat2, and Iodine, discussing their prevalence and unique characteristics. It also highlights Infoblox's Threat Insight machine learning algorithms, which can detect and block tunneling domains within minutes. The study provides insights into the detection rates of different tunneling families and discusses the challenges in differentiating between legitimate and malicious DNS traffic.

Pulse ID: 6878f6e5d14da64ae460ad61
Pulse Link: otx.alienvault.com/pulse/6878f
Pulse Author: AlienVault
Created: 2025-07-17 13:13:08

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

"Die CUII gibt auf." Huh. Krass! Da sieht man mal, wie sehr sich etwas Mut und Courage lohnen können - und auch dass Einzelne etwas bewirken können! ✊

Kontext: 2024 veröffentlichte eine damals 17–Jährige die eigentlich "geheimen" Sperrentscheide von Websites der privat organisierten und nicht demokratisch legitimierten "Clearingstelle Urheberrecht" (CUII),
ein Zusammenschluss von Urheber.innen und Providern. Nun soll es wieder Gerichtsentscheide für Sperren brauchen.
netzpolitik.org/2025/die-cuii-

netzpolitik.org · Die CUII gibt auf: Für Netzsperren braucht es jetzt einen GerichtsentscheidDie CUII, ein Zusammenschluss von Internetprovidern und Rechteinhabern, verzichtet nach einem Rüffel der Bundesnetzagentur darauf, nach eigenem Gutdünken Websites zu sperren. Das haben wir vermutlich der 18-jährigen Lina zu verdanken.

Since DNS is on 🔥 today I should note if you're a Splunk shop, the DNS data model in Enterprise Security does not include the field for TXT record values, you need to add that manually.

Then you can do high-fidelity detections such as length and base64 with conversions looking for code.

DNS TXT isn't just for malware, C2s and exfil. It can be fun too!

  • ASCII art (Resolve-DnsName -Type TXT run-dns.never.watch).Strings | Sort
  • Storing encodings 🐱.never.watch
  • Mazes! (Resolve-DnsName -Type TXT maze.never.watch).Strings | Sort
  • QR codes (Resolve-DnsName -Type TXT qr.never.watch).Strings -replace '#','█' | Sort
  • Trolling/activism ··⧸··⧸.never.watch
  • Guitar tabs
  • Playlists/reading lists
  • Geocities-era guest books

Unbound 1.23.1 in now available. This security release fixes the Rebirthday Attack CVE-2025-5994.

The vulnerability re-opens up #DNS resolvers to a birthday paradox, for EDNS client subnet servers that respond with non-ECS answers. The #CVE is described here:
nlnetlabs.nl/downloads/unbound

We would like to thank Xiang Li (AOSP Lab, Nankai University) for discovering and responsibly disclosing the vulnerability.
github.com/NLnetLabs/unbound/r

Just a quickie from one of our @DomainTools researchers today that I know @cR0w will enjoy.

Malware in DNS - specifically, malware seen being assembled from DNS TXT records.

Not a "zomg new thing!" so much as a neat example in the wild.

#infosec #cybersecurity #DNS

dti.domaintools.com/malware-in

DomainTools Investigations | DTI · Malware in DNS - DomainTools Investigations | DTIBecause it's always DNS, we wanted to share this fun finding of malware stored across DNS TXT records.