Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. "Run a quick DNS speed test" they said… 🤔

"Run a quick DNS speed test" they said… 🤔

Scheduled Pinned Locked Moved Uncategorized
dnsthreatintelthreatintelligecybercrimecybersecurity
1 Posts 1 Posters 1 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • infobloxthreatintel@infosec.exchangeI This user is from outside of this forum
    infobloxthreatintel@infosec.exchangeI This user is from outside of this forum
    infobloxthreatintel@infosec.exchange
    wrote last edited by
    #1

    "Run a quick DNS speed test" they said… 🤔

    One click on dns-speed.tail-f[.]de and your browser helpfully fans out ~5,000 HTTPS handshakes to "random" Cisco Top 1M domains in ~30 seconds.

    That randomness is doing a lot of work.

    Across a handful of runs we saw clients touching:

    - Government + defence: *.uscourts.gov, multiple .gov TLDs, and .mil hosts (incl. disa[.]mil, onr[.]navy[.]mil)
    - Microsoft sovereign/GCC High endpoints (dodsuite, usgovcloudapi, etc.)
    - Enterprise collaboration: 100+ Webex, Zoom infra, SharePoint/OneDrive tenants
    - Identity surfaces: 130+ auth/login patterns, Okta/Auth0/Duo tenants
    - Autodiscover for named orgs (useful for pre‑populating phish kits)
    - ~150 banking domains, globally distributed

    All from a page load. No content fetched, just "harmless" handshakes.

    What's interesting isn't malice so much as side‑effects. A "neutral" performance test becomes:
    - A spray of client IPs into sensitive identity and gov endpoints
    - Noisy, hard‑to‑explain telemetry for defenders ("why is this workstation touching DISA?")
    - Occasional redirects into less friendly corners of the web, courtesy of the long tail

    The stated aim is realism (avoid vendor‑optimised test servers). In practice, you inherit the internet's entire distribution of good, bad, and broken—and push it through end‑user browsers.

    It's a reminder that at scale, "just measuring" can look a lot like reconnaissance… or at least generate it for someone else.

    #dns #threatintel #threatintelligence #cybercrime #cybersecurity #infosec #infoblox #infobloxthreatintel

    1 Reply Last reply
    1
    0
    • R relay@relay.infosec.exchange shared this topic
    Reply
    • Reply as topic
    Log in to reply
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes


    • Login

    • Login or register to search.
    • First post
      Last post
    0
    • Categories
    • Recent
    • Tags
    • Popular
    • World
    • Users
    • Groups