Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. In today's episode of "Can It Run Doom": DNS fucking TXT records.

In today's episode of "Can It Run Doom": DNS fucking TXT records.

Scheduled Pinned Locked Moved Uncategorized
infosecdnsdoomitisalwaysdns
62 Posts 49 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • k3ym0@infosec.exchangeK This user is from outside of this forum
    k3ym0@infosec.exchangeK This user is from outside of this forum
    k3ym0@infosec.exchange
    wrote last edited by
    #1

    In today's episode of "Can It Run Doom": DNS fucking TXT records.

    Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

    RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

    Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

    blog: https://blog.rice.is/post/doom-over-dns/

    repo: https://github.com/resumex/doom-over-dns

    Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

    It was always DNS.

    #infosec #dns #doom #itisalwaysdns

    kajer@infosec.exchangeK badsamurai@infosec.exchangeB tarix29@tech.lgbtT circuitsunfish@plesiosaur.netC sabik@rants.auS 36 Replies Last reply
    2
    0
    • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

      In today's episode of "Can It Run Doom": DNS fucking TXT records.

      Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

      RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

      Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

      blog: https://blog.rice.is/post/doom-over-dns/

      repo: https://github.com/resumex/doom-over-dns

      Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

      It was always DNS.

      #infosec #dns #doom #itisalwaysdns

      kajer@infosec.exchangeK This user is from outside of this forum
      kajer@infosec.exchangeK This user is from outside of this forum
      kajer@infosec.exchange
      wrote last edited by
      #2

      @k3ym0 new cloud storage just dropped

      kajer@infosec.exchangeK 1 Reply Last reply
      0
      • kajer@infosec.exchangeK kajer@infosec.exchange

        @k3ym0 new cloud storage just dropped

        kajer@infosec.exchangeK This user is from outside of this forum
        kajer@infosec.exchangeK This user is from outside of this forum
        kajer@infosec.exchange
        wrote last edited by
        #3

        @k3ym0 big DNSFS energy

        Link Preview Image
        DNSFS. Store your files in others DNS resolver caches

        favicon

        (blog.benjojo.co.uk)

        yuvalne@433.worldY 1 Reply Last reply
        0
        • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

          In today's episode of "Can It Run Doom": DNS fucking TXT records.

          Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

          RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

          Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

          blog: https://blog.rice.is/post/doom-over-dns/

          repo: https://github.com/resumex/doom-over-dns

          Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

          It was always DNS.

          #infosec #dns #doom #itisalwaysdns

          badsamurai@infosec.exchangeB This user is from outside of this forum
          badsamurai@infosec.exchangeB This user is from outside of this forum
          badsamurai@infosec.exchange
          wrote last edited by
          #4

          @k3ym0

          #dns

          Link Preview Image
          1 Reply Last reply
          0
          • mrmasterkeyboard@mastodon.socialM mrmasterkeyboard@mastodon.social shared this topic
          • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

            In today's episode of "Can It Run Doom": DNS fucking TXT records.

            Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

            RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

            Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

            blog: https://blog.rice.is/post/doom-over-dns/

            repo: https://github.com/resumex/doom-over-dns

            Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

            It was always DNS.

            #infosec #dns #doom #itisalwaysdns

            tarix29@tech.lgbtT This user is from outside of this forum
            tarix29@tech.lgbtT This user is from outside of this forum
            tarix29@tech.lgbt
            wrote last edited by
            #5

            @k3ym0 you may already know this, but on a related note you can tunnel basically any IPv4 traffic over DNS: https://code.kryo.se/iodine/

            jbaert@mastodon.socialJ 1 Reply Last reply
            0
            • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

              In today's episode of "Can It Run Doom": DNS fucking TXT records.

              Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

              RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

              Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

              blog: https://blog.rice.is/post/doom-over-dns/

              repo: https://github.com/resumex/doom-over-dns

              Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

              It was always DNS.

              #infosec #dns #doom #itisalwaysdns

              circuitsunfish@plesiosaur.netC This user is from outside of this forum
              circuitsunfish@plesiosaur.netC This user is from outside of this forum
              circuitsunfish@plesiosaur.net
              wrote last edited by
              #6

              @k3ym0 shit like this makes me glad I no longer work in #cybersec

              1 Reply Last reply
              0
              • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                In today's episode of "Can It Run Doom": DNS fucking TXT records.

                Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

                RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

                Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

                blog: https://blog.rice.is/post/doom-over-dns/

                repo: https://github.com/resumex/doom-over-dns

                Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

                It was always DNS.

                #infosec #dns #doom #itisalwaysdns

                sabik@rants.auS This user is from outside of this forum
                sabik@rants.auS This user is from outside of this forum
                sabik@rants.au
                wrote last edited by
                #7

                @k3ym0
                IP over DNS has been a thing for a while now, sometimes used to bypass captive portals for paid internet access

                #infosec #dns #doom #itisalwaysdns

                1 Reply Last reply
                0
                • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                  In today's episode of "Can It Run Doom": DNS fucking TXT records.

                  Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

                  RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

                  Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

                  blog: https://blog.rice.is/post/doom-over-dns/

                  repo: https://github.com/resumex/doom-over-dns

                  Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

                  It was always DNS.

                  #infosec #dns #doom #itisalwaysdns

                  linza@kamu.socialL This user is from outside of this forum
                  linza@kamu.socialL This user is from outside of this forum
                  linza@kamu.social
                  wrote last edited by
                  #8

                  @k3ym0

                  1 Reply Last reply
                  0
                  • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                    In today's episode of "Can It Run Doom": DNS fucking TXT records.

                    Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

                    RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

                    Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

                    blog: https://blog.rice.is/post/doom-over-dns/

                    repo: https://github.com/resumex/doom-over-dns

                    Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

                    It was always DNS.

                    #infosec #dns #doom #itisalwaysdns

                    simondassow@masto.aiS This user is from outside of this forum
                    simondassow@masto.aiS This user is from outside of this forum
                    simondassow@masto.ai
                    wrote last edited by
                    #9

                    @k3ym0 Doom Network Service 🎉

                    k3ym0@infosec.exchangeK 1 Reply Last reply
                    0
                    • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                      In today's episode of "Can It Run Doom": DNS fucking TXT records.

                      Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

                      RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

                      Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

                      blog: https://blog.rice.is/post/doom-over-dns/

                      repo: https://github.com/resumex/doom-over-dns

                      Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

                      It was always DNS.

                      #infosec #dns #doom #itisalwaysdns

                      dago@river.group.ltD This user is from outside of this forum
                      dago@river.group.ltD This user is from outside of this forum
                      dago@river.group.lt
                      wrote last edited by
                      #10

                      @k3ym0 shit. Time to do Bad Apple on DNS.

                      1 Reply Last reply
                      0
                      • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                        In today's episode of "Can It Run Doom": DNS fucking TXT records.

                        Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

                        RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

                        Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

                        blog: https://blog.rice.is/post/doom-over-dns/

                        repo: https://github.com/resumex/doom-over-dns

                        Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

                        It was always DNS.

                        #infosec #dns #doom #itisalwaysdns

                        aris@infosec.exchangeA This user is from outside of this forum
                        aris@infosec.exchangeA This user is from outside of this forum
                        aris@infosec.exchange
                        wrote last edited by
                        #11

                        @k3ym0 The concept is very old, I was using dns2tcp to have free wifi on plane trips in 2010 and even before during pentests. Long TXT replies trigger red alerts on most intrusion detection systems nowadays.

                        1 Reply Last reply
                        0
                        • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                          In today's episode of "Can It Run Doom": DNS fucking TXT records.

                          Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

                          RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

                          Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

                          blog: https://blog.rice.is/post/doom-over-dns/

                          repo: https://github.com/resumex/doom-over-dns

                          Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

                          It was always DNS.

                          #infosec #dns #doom #itisalwaysdns

                          nine@chitter.xyzN This user is from outside of this forum
                          nine@chitter.xyzN This user is from outside of this forum
                          nine@chitter.xyz
                          wrote last edited by
                          #12

                          @k3ym0 now... can it do deathmatch over doom over dns? :3

                          1 Reply Last reply
                          0
                          • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                            In today's episode of "Can It Run Doom": DNS fucking TXT records.

                            Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

                            RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

                            Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

                            blog: https://blog.rice.is/post/doom-over-dns/

                            repo: https://github.com/resumex/doom-over-dns

                            Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

                            It was always DNS.

                            #infosec #dns #doom #itisalwaysdns

                            tml@mementomori.socialT This user is from outside of this forum
                            tml@mementomori.socialT This user is from outside of this forum
                            tml@mementomori.social
                            wrote last edited by
                            #13

                            @k3ym0 For quite a loose definition of "run".

                            1 Reply Last reply
                            0
                            • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                              In today's episode of "Can It Run Doom": DNS fucking TXT records.

                              Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

                              RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

                              Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

                              blog: https://blog.rice.is/post/doom-over-dns/

                              repo: https://github.com/resumex/doom-over-dns

                              Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

                              It was always DNS.

                              #infosec #dns #doom #itisalwaysdns

                              wolf480pl@mstdn.ioW This user is from outside of this forum
                              wolf480pl@mstdn.ioW This user is from outside of this forum
                              wolf480pl@mstdn.io
                              wrote last edited by
                              #14

                              @k3ym0
                              > covert data exfil channel

                              as if iodine wasn't already a thing

                              1 Reply Last reply
                              0
                              • simondassow@masto.aiS simondassow@masto.ai

                                @k3ym0 Doom Network Service 🎉

                                k3ym0@infosec.exchangeK This user is from outside of this forum
                                k3ym0@infosec.exchangeK This user is from outside of this forum
                                k3ym0@infosec.exchange
                                wrote last edited by
                                #15

                                @simondassow Doom-aaS?

                                1 Reply Last reply
                                0
                                • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                                  In today's episode of "Can It Run Doom": DNS fucking TXT records.

                                  Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

                                  RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

                                  Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

                                  blog: https://blog.rice.is/post/doom-over-dns/

                                  repo: https://github.com/resumex/doom-over-dns

                                  Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

                                  It was always DNS.

                                  #infosec #dns #doom #itisalwaysdns

                                  da_667@infosec.exchangeD This user is from outside of this forum
                                  da_667@infosec.exchangeD This user is from outside of this forum
                                  da_667@infosec.exchange
                                  wrote last edited by
                                  #16

                                  @k3ym0 "good luck if you're not doing deep DNS inspection"

                                  iodine, dnscat, and literally every other DNS tunneling technique that has existed in the past 20-ish years: lol. lmao, even.

                                  Still, quite impressive, but saying this shit is a hard to detect covert channel is unmitigated bullshit.

                                  k3ym0@infosec.exchangeK 1 Reply Last reply
                                  0
                                  • da_667@infosec.exchangeD da_667@infosec.exchange

                                    @k3ym0 "good luck if you're not doing deep DNS inspection"

                                    iodine, dnscat, and literally every other DNS tunneling technique that has existed in the past 20-ish years: lol. lmao, even.

                                    Still, quite impressive, but saying this shit is a hard to detect covert channel is unmitigated bullshit.

                                    k3ym0@infosec.exchangeK This user is from outside of this forum
                                    k3ym0@infosec.exchangeK This user is from outside of this forum
                                    k3ym0@infosec.exchange
                                    wrote last edited by
                                    #17

                                    @da_667 iodine and dnscat also have 20 years of signatures, known patterns, and detection logic baked into tooling. This doesn't.

                                    But honestly that's beside the point. "Detectable" and "detected" are two very different sentences. iodine has been detectable for 20 years and I've watched it walk right out of enterprise networks that had no idea. Known technique != mature detection coverage in the median org.

                                    SMB's are running Server 2008r2 with a Watchguard FW and a prayer. Mid-market is logging DNS at the firewall level and calling it done.

                                    "Detectable in theory by a mature SOC" and "hard to detect in most real environments" are not mutually exclusive statements.

                                    rx13@infosec.exchangeR davemwilburn@infosec.exchangeD 2 Replies Last reply
                                    0
                                    • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                                      @da_667 iodine and dnscat also have 20 years of signatures, known patterns, and detection logic baked into tooling. This doesn't.

                                      But honestly that's beside the point. "Detectable" and "detected" are two very different sentences. iodine has been detectable for 20 years and I've watched it walk right out of enterprise networks that had no idea. Known technique != mature detection coverage in the median org.

                                      SMB's are running Server 2008r2 with a Watchguard FW and a prayer. Mid-market is logging DNS at the firewall level and calling it done.

                                      "Detectable in theory by a mature SOC" and "hard to detect in most real environments" are not mutually exclusive statements.

                                      rx13@infosec.exchangeR This user is from outside of this forum
                                      rx13@infosec.exchangeR This user is from outside of this forum
                                      rx13@infosec.exchange
                                      wrote last edited by
                                      #18

                                      @k3ym0
                                      @da_667

                                      * Cries in DoH-allowed-networks *

                                      da_667@infosec.exchangeD 1 Reply Last reply
                                      0
                                      • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                                        In today's episode of "Can It Run Doom": DNS fucking TXT records.

                                        Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

                                        RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

                                        Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

                                        blog: https://blog.rice.is/post/doom-over-dns/

                                        repo: https://github.com/resumex/doom-over-dns

                                        Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

                                        It was always DNS.

                                        #infosec #dns #doom #itisalwaysdns

                                        albirew@soshar.dess.gaA This user is from outside of this forum
                                        albirew@soshar.dess.gaA This user is from outside of this forum
                                        albirew@soshar.dess.ga
                                        wrote last edited by
                                        #19
                                        @k3ym0@infosec.exchange DNS haiku just got a lot bloodier...
                                        1 Reply Last reply
                                        0
                                        • rx13@infosec.exchangeR rx13@infosec.exchange

                                          @k3ym0
                                          @da_667

                                          * Cries in DoH-allowed-networks *

                                          da_667@infosec.exchangeD This user is from outside of this forum
                                          da_667@infosec.exchangeD This user is from outside of this forum
                                          da_667@infosec.exchange
                                          wrote last edited by
                                          #20

                                          @rx13 @k3ym0

                                          /point
                                          /laugh

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups