Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. πŸ” Inside the Tech: New Talk Added to BSides Luxembourg

πŸ” Inside the Tech: New Talk Added to BSides Luxembourg

Scheduled Pinned Locked Moved Uncategorized
bsidesluxembourosintdnsattacksurfacethreatintellige
1 Posts 1 Posters 7 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • bsidesluxembourg@infosec.exchangeB This user is from outside of this forum
    bsidesluxembourg@infosec.exchangeB This user is from outside of this forum
    bsidesluxembourg@infosec.exchange
    wrote last edited by
    #1

    πŸ” Inside the Tech: New Talk Added to BSides Luxembourg

    πŸŒπŸ“‘ π—§π—›π—˜ 𝗙𝗒π—₯π—šπ—’π—§π—§π—˜π—‘ π—™π—œπ—‘π—šπ—˜π—₯𝗣π—₯π—œπ—‘π—§: 𝗗𝗑𝗦 π—•π—”π—¦π—˜π—— π—’π—¦π—œπ—‘π—§ π—§π—˜π—–π—›π—‘π—œπ—€π—¨π—˜π—¦ 𝗙𝗒π—₯ 𝗣π—₯𝗒𝗗𝗨𝗖𝗧 & π—¦π—˜π—₯π—©π—œπ—–π—˜ π——π—œπ—¦π—–π—’π—©π—˜π—₯𝗬 – Rishi ( @rxerium )

    ⚑ Reveal hidden infrastructure in a Talk (40 min) using DNS TXT records to map technologies, dependencies, and external services at scale.

    DNS is often treated as infrastructure plumbing, but TXT records quietly expose far more than most defenders realize. This session introduces a DNS-based OSINT methodology that leverages large-scale TXT record analysis to uncover embedded service dependencies such as cloud platforms, SaaS integrations, and identity providers.

    By programmatically scanning DNS zones and integrating the technique into tools like Nuclei and OWASP Amass, this approach enables security teams to build detailed maps of organizational technology stacks and attack surfaces. A real-world case study from the Salesloft breach demonstrates how these signals translate into actionable intelligence for both offensive and defensive use cases.

    Rishi ( @rxerium ) is a London-based security researcher focused on vulnerability research, threat intelligence, and OSINT-driven attack surface discovery. He contributes to open-source security tooling, supports the UK OSINT community, and focuses on building scalable reconnaissance and detection methodologies.

    πŸ“… Conference Dates: 6–8 May 2026 | 09:00–18:00
    πŸ“ 14, Porte de France, Esch-sur-Alzette, Luxembourg
    🎟️ Tickets: https://2026.bsides.lu/tickets/

    πŸ“… Schedule Link: https://pretalx.com/bsidesluxembourg-2026/schedule/

    πŸ“² View full schedule & build your agenda: https://hackertracker.app/schedule?conf=BSIDESLUX2026

    #BSidesLuxembourg2026 #OSINT #DNS #AttackSurface #ThreatIntelligence #CyberSecurity

    1 Reply Last reply
    1
    0
    • R relay@relay.infosec.exchange shared this topic
    Reply
    • Reply as topic
    Log in to reply
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes


    • Login

    • Login or register to search.
    • First post
      Last post
    0
    • Categories
    • Recent
    • Tags
    • Popular
    • World
    • Users
    • Groups