Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Bout to piss off cloudflare users with my DNS examples, but honest to god, you provide free web hosting, and didn't expect this shit to be abused for phishing?

Bout to piss off cloudflare users with my DNS examples, but honest to god, you provide free web hosting, and didn't expect this shit to be abused for phishing?

Scheduled Pinned Locked Moved Uncategorized
14 Posts 7 Posters 14 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • da_667@infosec.exchangeD da_667@infosec.exchange

    Bout to piss off cloudflare users with my DNS examples, but honest to god, you provide free web hosting, and didn't expect this shit to be abused for phishing?

    rx13@infosec.exchangeR This user is from outside of this forum
    rx13@infosec.exchangeR This user is from outside of this forum
    rx13@infosec.exchange
    wrote last edited by
    #3

    @da_667 Be sure to include that their abuse reporting has an API now, so send early and often. (Only required scope on the API key is Account->Trust & Safety->Edit

    Link Preview Image
    Abuse Reports

    favicon

    Cloudflare API (developers.cloudflare.com)

    johnley@infosec.exchangeJ da_667@infosec.exchangeD nyanbinary@infosec.exchangeN 3 Replies Last reply
    0
    • rx13@infosec.exchangeR rx13@infosec.exchange

      @da_667 Be sure to include that their abuse reporting has an API now, so send early and often. (Only required scope on the API key is Account->Trust & Safety->Edit

      Link Preview Image
      Abuse Reports

      favicon

      Cloudflare API (developers.cloudflare.com)

      johnley@infosec.exchangeJ This user is from outside of this forum
      johnley@infosec.exchangeJ This user is from outside of this forum
      johnley@infosec.exchange
      wrote last edited by
      #4

      @rx13 @da_667 holy moly time to integrate this

      1 Reply Last reply
      0
      • rx13@infosec.exchangeR rx13@infosec.exchange

        @da_667 Be sure to include that their abuse reporting has an API now, so send early and often. (Only required scope on the API key is Account->Trust & Safety->Edit

        Link Preview Image
        Abuse Reports

        favicon

        Cloudflare API (developers.cloudflare.com)

        da_667@infosec.exchangeD This user is from outside of this forum
        da_667@infosec.exchangeD This user is from outside of this forum
        da_667@infosec.exchange
        wrote last edited by
        #5

        @rx13 duly noted. thanks!

        1 Reply Last reply
        0
        • da_667@infosec.exchangeD da_667@infosec.exchange

          Bout to piss off cloudflare users with my DNS examples, but honest to god, you provide free web hosting, and didn't expect this shit to be abused for phishing?

          schrotthaufen@mastodon.socialS This user is from outside of this forum
          schrotthaufen@mastodon.socialS This user is from outside of this forum
          schrotthaufen@mastodon.social
          wrote last edited by
          #6

          @da_667 Oh yeah… resend dot dev is on clownflare, too. I swear to all the old gods, that service exists solely to provide spammers a comfortable API. (And it’s operated by a legit business that advertises “Be the first to know if your domain is added to a DNSBL such as those offered by Spamhaus with removal requests generated by Resend.”)

          1 Reply Last reply
          0
          • da_667@infosec.exchangeD da_667@infosec.exchange

            Bout to piss off cloudflare users with my DNS examples, but honest to god, you provide free web hosting, and didn't expect this shit to be abused for phishing?

            kallisti@infosec.exchangeK This user is from outside of this forum
            kallisti@infosec.exchangeK This user is from outside of this forum
            kallisti@infosec.exchange
            wrote last edited by
            #7

            @da_667

            Do you think free web hosting is an inherently bad thing?

            da_667@infosec.exchangeD 1 Reply Last reply
            0
            • kallisti@infosec.exchangeK kallisti@infosec.exchange

              @da_667

              Do you think free web hosting is an inherently bad thing?

              da_667@infosec.exchangeD This user is from outside of this forum
              da_667@infosec.exchangeD This user is from outside of this forum
              da_667@infosec.exchange
              wrote last edited by
              #8

              @kallisti It's a complicated subject. Free hosting is usually fine, but just like every other free hosting service on the internet, somebody is bound to fuck it up and abuse it. My beef is that cloudflare is kinda lax on handling their abuse claims.

              kallisti@infosec.exchangeK 1 Reply Last reply
              0
              • rx13@infosec.exchangeR rx13@infosec.exchange

                @da_667 Be sure to include that their abuse reporting has an API now, so send early and often. (Only required scope on the API key is Account->Trust & Safety->Edit

                Link Preview Image
                Abuse Reports

                favicon

                Cloudflare API (developers.cloudflare.com)

                nyanbinary@infosec.exchangeN This user is from outside of this forum
                nyanbinary@infosec.exchangeN This user is from outside of this forum
                nyanbinary@infosec.exchange
                wrote last edited by
                #9

                @rx13 @da_667 ...oh we are 100℅ baking that into some response scripts

                nyanbinary@infosec.exchangeN rx13@infosec.exchangeR 2 Replies Last reply
                0
                • da_667@infosec.exchangeD da_667@infosec.exchange

                  @kallisti It's a complicated subject. Free hosting is usually fine, but just like every other free hosting service on the internet, somebody is bound to fuck it up and abuse it. My beef is that cloudflare is kinda lax on handling their abuse claims.

                  kallisti@infosec.exchangeK This user is from outside of this forum
                  kallisti@infosec.exchangeK This user is from outside of this forum
                  kallisti@infosec.exchange
                  wrote last edited by
                  #10

                  @da_667

                  Fair enough.
                  I'd add that the "somebody is bound to fuck it up and abuse it" part applies to any piece of software and/or infrastructure, and putting things behind a paywall (i.e. making it inaccessible for people on a budget) should never be the solution.

                  But handling abuse accurately and decisively, is, as you said yourself, the way to go and something to be expected especially from a company that big.

                  da_667@infosec.exchangeD 1 Reply Last reply
                  0
                  • nyanbinary@infosec.exchangeN nyanbinary@infosec.exchange

                    @rx13 @da_667 ...oh we are 100℅ baking that into some response scripts

                    nyanbinary@infosec.exchangeN This user is from outside of this forum
                    nyanbinary@infosec.exchangeN This user is from outside of this forum
                    nyanbinary@infosec.exchange
                    wrote last edited by
                    #11

                    @rx13 @da_667 ...checks docs

                    email: string
                    A valid email of the abuse reporter. This field may be released by Cloudflare to third parties such as the Lumen Database (https://lumendatabase.org/).

                    email2: string
                    Should match the value provided in email

                    Lol

                    1 Reply Last reply
                    0
                    • kallisti@infosec.exchangeK kallisti@infosec.exchange

                      @da_667

                      Fair enough.
                      I'd add that the "somebody is bound to fuck it up and abuse it" part applies to any piece of software and/or infrastructure, and putting things behind a paywall (i.e. making it inaccessible for people on a budget) should never be the solution.

                      But handling abuse accurately and decisively, is, as you said yourself, the way to go and something to be expected especially from a company that big.

                      da_667@infosec.exchangeD This user is from outside of this forum
                      da_667@infosec.exchangeD This user is from outside of this forum
                      da_667@infosec.exchange
                      wrote last edited by
                      #12

                      @kallisti that's my big problem is that they aren't particularly good or fast at handling abuse claims. But like, take pastebin for instance. There was a period of time where it was heavily abused, and in spite of NOT being a gigantic company, they actually move pretty fast to remove malicious pastes. That's the difference. pastebin is free, and they actually care about not being a festering malware host.

                      da_667@infosec.exchangeD 1 Reply Last reply
                      0
                      • da_667@infosec.exchangeD da_667@infosec.exchange

                        @kallisti that's my big problem is that they aren't particularly good or fast at handling abuse claims. But like, take pastebin for instance. There was a period of time where it was heavily abused, and in spite of NOT being a gigantic company, they actually move pretty fast to remove malicious pastes. That's the difference. pastebin is free, and they actually care about not being a festering malware host.

                        da_667@infosec.exchangeD This user is from outside of this forum
                        da_667@infosec.exchangeD This user is from outside of this forum
                        da_667@infosec.exchange
                        wrote last edited by
                        #13

                        @kallisti its still a problem, but they're mindful of it.

                        1 Reply Last reply
                        0
                        • nyanbinary@infosec.exchangeN nyanbinary@infosec.exchange

                          @rx13 @da_667 ...oh we are 100℅ baking that into some response scripts

                          rx13@infosec.exchangeR This user is from outside of this forum
                          rx13@infosec.exchangeR This user is from outside of this forum
                          rx13@infosec.exchange
                          wrote last edited by
                          #14

                          @nyanbinary @da_667
                          Yeah, I've spent the last few days creating a Tracecat pipeline that greps logs for phishing domains coming to our platform (attackers don't get to control browsers, so we always get a nice 'referrer' value from where they're sending customers for phishing)

                          Now, it parses the last timeblock of logs filtered to domains that aren't our topN, and does a whois/tls cert check against each one, if the whois reg date is ❤ months, and the cert belongs to cloudflare, they get automated takedown requests

                          1 Reply Last reply
                          1
                          0
                          • R relay@relay.infosec.exchange shared this topic
                          Reply
                          • Reply as topic
                          Log in to reply
                          • Oldest to Newest
                          • Newest to Oldest
                          • Most Votes


                          • Login

                          • Login or register to search.
                          • First post
                            Last post
                          0
                          • Categories
                          • Recent
                          • Tags
                          • Popular
                          • World
                          • Users
                          • Groups