Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Bout to piss off cloudflare users with my DNS examples, but honest to god, you provide free web hosting, and didn't expect this shit to be abused for phishing?

Bout to piss off cloudflare users with my DNS examples, but honest to god, you provide free web hosting, and didn't expect this shit to be abused for phishing?

Scheduled Pinned Locked Moved Uncategorized
14 Posts 7 Posters 14 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • da_667@infosec.exchangeD da_667@infosec.exchange

    Bout to piss off cloudflare users with my DNS examples, but honest to god, you provide free web hosting, and didn't expect this shit to be abused for phishing?

    rootwyrm@weird.autosR This user is from outside of this forum
    rootwyrm@weird.autosR This user is from outside of this forum
    rootwyrm@weird.autos
    wrote last edited by
    #2

    @da_667 and I all but guarantee you that second one already exists anyways.

    1 Reply Last reply
    0
    • da_667@infosec.exchangeD da_667@infosec.exchange

      Bout to piss off cloudflare users with my DNS examples, but honest to god, you provide free web hosting, and didn't expect this shit to be abused for phishing?

      rx13@infosec.exchangeR This user is from outside of this forum
      rx13@infosec.exchangeR This user is from outside of this forum
      rx13@infosec.exchange
      wrote last edited by
      #3

      @da_667 Be sure to include that their abuse reporting has an API now, so send early and often. (Only required scope on the API key is Account->Trust & Safety->Edit

      Link Preview Image
      Abuse Reports

      favicon

      Cloudflare API (developers.cloudflare.com)

      johnley@infosec.exchangeJ da_667@infosec.exchangeD nyanbinary@infosec.exchangeN 3 Replies Last reply
      0
      • rx13@infosec.exchangeR rx13@infosec.exchange

        @da_667 Be sure to include that their abuse reporting has an API now, so send early and often. (Only required scope on the API key is Account->Trust & Safety->Edit

        Link Preview Image
        Abuse Reports

        favicon

        Cloudflare API (developers.cloudflare.com)

        johnley@infosec.exchangeJ This user is from outside of this forum
        johnley@infosec.exchangeJ This user is from outside of this forum
        johnley@infosec.exchange
        wrote last edited by
        #4

        @rx13 @da_667 holy moly time to integrate this

        1 Reply Last reply
        0
        • rx13@infosec.exchangeR rx13@infosec.exchange

          @da_667 Be sure to include that their abuse reporting has an API now, so send early and often. (Only required scope on the API key is Account->Trust & Safety->Edit

          Link Preview Image
          Abuse Reports

          favicon

          Cloudflare API (developers.cloudflare.com)

          da_667@infosec.exchangeD This user is from outside of this forum
          da_667@infosec.exchangeD This user is from outside of this forum
          da_667@infosec.exchange
          wrote last edited by
          #5

          @rx13 duly noted. thanks!

          1 Reply Last reply
          0
          • da_667@infosec.exchangeD da_667@infosec.exchange

            Bout to piss off cloudflare users with my DNS examples, but honest to god, you provide free web hosting, and didn't expect this shit to be abused for phishing?

            schrotthaufen@mastodon.socialS This user is from outside of this forum
            schrotthaufen@mastodon.socialS This user is from outside of this forum
            schrotthaufen@mastodon.social
            wrote last edited by
            #6

            @da_667 Oh yeah… resend dot dev is on clownflare, too. I swear to all the old gods, that service exists solely to provide spammers a comfortable API. (And it’s operated by a legit business that advertises “Be the first to know if your domain is added to a DNSBL such as those offered by Spamhaus with removal requests generated by Resend.”)

            1 Reply Last reply
            0
            • da_667@infosec.exchangeD da_667@infosec.exchange

              Bout to piss off cloudflare users with my DNS examples, but honest to god, you provide free web hosting, and didn't expect this shit to be abused for phishing?

              kallisti@infosec.exchangeK This user is from outside of this forum
              kallisti@infosec.exchangeK This user is from outside of this forum
              kallisti@infosec.exchange
              wrote last edited by
              #7

              @da_667

              Do you think free web hosting is an inherently bad thing?

              da_667@infosec.exchangeD 1 Reply Last reply
              0
              • kallisti@infosec.exchangeK kallisti@infosec.exchange

                @da_667

                Do you think free web hosting is an inherently bad thing?

                da_667@infosec.exchangeD This user is from outside of this forum
                da_667@infosec.exchangeD This user is from outside of this forum
                da_667@infosec.exchange
                wrote last edited by
                #8

                @kallisti It's a complicated subject. Free hosting is usually fine, but just like every other free hosting service on the internet, somebody is bound to fuck it up and abuse it. My beef is that cloudflare is kinda lax on handling their abuse claims.

                kallisti@infosec.exchangeK 1 Reply Last reply
                0
                • rx13@infosec.exchangeR rx13@infosec.exchange

                  @da_667 Be sure to include that their abuse reporting has an API now, so send early and often. (Only required scope on the API key is Account->Trust & Safety->Edit

                  Link Preview Image
                  Abuse Reports

                  favicon

                  Cloudflare API (developers.cloudflare.com)

                  nyanbinary@infosec.exchangeN This user is from outside of this forum
                  nyanbinary@infosec.exchangeN This user is from outside of this forum
                  nyanbinary@infosec.exchange
                  wrote last edited by
                  #9

                  @rx13 @da_667 ...oh we are 100℅ baking that into some response scripts

                  nyanbinary@infosec.exchangeN rx13@infosec.exchangeR 2 Replies Last reply
                  0
                  • da_667@infosec.exchangeD da_667@infosec.exchange

                    @kallisti It's a complicated subject. Free hosting is usually fine, but just like every other free hosting service on the internet, somebody is bound to fuck it up and abuse it. My beef is that cloudflare is kinda lax on handling their abuse claims.

                    kallisti@infosec.exchangeK This user is from outside of this forum
                    kallisti@infosec.exchangeK This user is from outside of this forum
                    kallisti@infosec.exchange
                    wrote last edited by
                    #10

                    @da_667

                    Fair enough.
                    I'd add that the "somebody is bound to fuck it up and abuse it" part applies to any piece of software and/or infrastructure, and putting things behind a paywall (i.e. making it inaccessible for people on a budget) should never be the solution.

                    But handling abuse accurately and decisively, is, as you said yourself, the way to go and something to be expected especially from a company that big.

                    da_667@infosec.exchangeD 1 Reply Last reply
                    0
                    • nyanbinary@infosec.exchangeN nyanbinary@infosec.exchange

                      @rx13 @da_667 ...oh we are 100℅ baking that into some response scripts

                      nyanbinary@infosec.exchangeN This user is from outside of this forum
                      nyanbinary@infosec.exchangeN This user is from outside of this forum
                      nyanbinary@infosec.exchange
                      wrote last edited by
                      #11

                      @rx13 @da_667 ...checks docs

                      email: string
                      A valid email of the abuse reporter. This field may be released by Cloudflare to third parties such as the Lumen Database (https://lumendatabase.org/).

                      email2: string
                      Should match the value provided in email

                      Lol

                      1 Reply Last reply
                      0
                      • kallisti@infosec.exchangeK kallisti@infosec.exchange

                        @da_667

                        Fair enough.
                        I'd add that the "somebody is bound to fuck it up and abuse it" part applies to any piece of software and/or infrastructure, and putting things behind a paywall (i.e. making it inaccessible for people on a budget) should never be the solution.

                        But handling abuse accurately and decisively, is, as you said yourself, the way to go and something to be expected especially from a company that big.

                        da_667@infosec.exchangeD This user is from outside of this forum
                        da_667@infosec.exchangeD This user is from outside of this forum
                        da_667@infosec.exchange
                        wrote last edited by
                        #12

                        @kallisti that's my big problem is that they aren't particularly good or fast at handling abuse claims. But like, take pastebin for instance. There was a period of time where it was heavily abused, and in spite of NOT being a gigantic company, they actually move pretty fast to remove malicious pastes. That's the difference. pastebin is free, and they actually care about not being a festering malware host.

                        da_667@infosec.exchangeD 1 Reply Last reply
                        0
                        • da_667@infosec.exchangeD da_667@infosec.exchange

                          @kallisti that's my big problem is that they aren't particularly good or fast at handling abuse claims. But like, take pastebin for instance. There was a period of time where it was heavily abused, and in spite of NOT being a gigantic company, they actually move pretty fast to remove malicious pastes. That's the difference. pastebin is free, and they actually care about not being a festering malware host.

                          da_667@infosec.exchangeD This user is from outside of this forum
                          da_667@infosec.exchangeD This user is from outside of this forum
                          da_667@infosec.exchange
                          wrote last edited by
                          #13

                          @kallisti its still a problem, but they're mindful of it.

                          1 Reply Last reply
                          0
                          • nyanbinary@infosec.exchangeN nyanbinary@infosec.exchange

                            @rx13 @da_667 ...oh we are 100℅ baking that into some response scripts

                            rx13@infosec.exchangeR This user is from outside of this forum
                            rx13@infosec.exchangeR This user is from outside of this forum
                            rx13@infosec.exchange
                            wrote last edited by
                            #14

                            @nyanbinary @da_667
                            Yeah, I've spent the last few days creating a Tracecat pipeline that greps logs for phishing domains coming to our platform (attackers don't get to control browsers, so we always get a nice 'referrer' value from where they're sending customers for phishing)

                            Now, it parses the last timeblock of logs filtered to domains that aren't our topN, and does a whois/tls cert check against each one, if the whois reg date is ❤ months, and the cert belongs to cloudflare, they get automated takedown requests

                            1 Reply Last reply
                            1
                            0
                            • R relay@relay.infosec.exchange shared this topic
                            Reply
                            • Reply as topic
                            Log in to reply
                            • Oldest to Newest
                            • Newest to Oldest
                            • Most Votes


                            • Login

                            • Login or register to search.
                            • First post
                              Last post
                            0
                            • Categories
                            • Recent
                            • Tags
                            • Popular
                            • World
                            • Users
                            • Groups