Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Bout to piss off cloudflare users with my DNS examples, but honest to god, you provide free web hosting, and didn't expect this shit to be abused for phishing?

Bout to piss off cloudflare users with my DNS examples, but honest to god, you provide free web hosting, and didn't expect this shit to be abused for phishing?

Scheduled Pinned Locked Moved Uncategorized
14 Posts 7 Posters 14 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • rx13@infosec.exchangeR rx13@infosec.exchange

    @da_667 Be sure to include that their abuse reporting has an API now, so send early and often. (Only required scope on the API key is Account->Trust & Safety->Edit

    Link Preview Image
    Abuse Reports

    favicon

    Cloudflare API (developers.cloudflare.com)

    johnley@infosec.exchangeJ This user is from outside of this forum
    johnley@infosec.exchangeJ This user is from outside of this forum
    johnley@infosec.exchange
    wrote last edited by
    #4

    @rx13 @da_667 holy moly time to integrate this

    1 Reply Last reply
    0
    • rx13@infosec.exchangeR rx13@infosec.exchange

      @da_667 Be sure to include that their abuse reporting has an API now, so send early and often. (Only required scope on the API key is Account->Trust & Safety->Edit

      Link Preview Image
      Abuse Reports

      favicon

      Cloudflare API (developers.cloudflare.com)

      da_667@infosec.exchangeD This user is from outside of this forum
      da_667@infosec.exchangeD This user is from outside of this forum
      da_667@infosec.exchange
      wrote last edited by
      #5

      @rx13 duly noted. thanks!

      1 Reply Last reply
      0
      • da_667@infosec.exchangeD da_667@infosec.exchange

        Bout to piss off cloudflare users with my DNS examples, but honest to god, you provide free web hosting, and didn't expect this shit to be abused for phishing?

        schrotthaufen@mastodon.socialS This user is from outside of this forum
        schrotthaufen@mastodon.socialS This user is from outside of this forum
        schrotthaufen@mastodon.social
        wrote last edited by
        #6

        @da_667 Oh yeah… resend dot dev is on clownflare, too. I swear to all the old gods, that service exists solely to provide spammers a comfortable API. (And it’s operated by a legit business that advertises “Be the first to know if your domain is added to a DNSBL such as those offered by Spamhaus with removal requests generated by Resend.”)

        1 Reply Last reply
        0
        • da_667@infosec.exchangeD da_667@infosec.exchange

          Bout to piss off cloudflare users with my DNS examples, but honest to god, you provide free web hosting, and didn't expect this shit to be abused for phishing?

          kallisti@infosec.exchangeK This user is from outside of this forum
          kallisti@infosec.exchangeK This user is from outside of this forum
          kallisti@infosec.exchange
          wrote last edited by
          #7

          @da_667

          Do you think free web hosting is an inherently bad thing?

          da_667@infosec.exchangeD 1 Reply Last reply
          0
          • kallisti@infosec.exchangeK kallisti@infosec.exchange

            @da_667

            Do you think free web hosting is an inherently bad thing?

            da_667@infosec.exchangeD This user is from outside of this forum
            da_667@infosec.exchangeD This user is from outside of this forum
            da_667@infosec.exchange
            wrote last edited by
            #8

            @kallisti It's a complicated subject. Free hosting is usually fine, but just like every other free hosting service on the internet, somebody is bound to fuck it up and abuse it. My beef is that cloudflare is kinda lax on handling their abuse claims.

            kallisti@infosec.exchangeK 1 Reply Last reply
            0
            • rx13@infosec.exchangeR rx13@infosec.exchange

              @da_667 Be sure to include that their abuse reporting has an API now, so send early and often. (Only required scope on the API key is Account->Trust & Safety->Edit

              Link Preview Image
              Abuse Reports

              favicon

              Cloudflare API (developers.cloudflare.com)

              nyanbinary@infosec.exchangeN This user is from outside of this forum
              nyanbinary@infosec.exchangeN This user is from outside of this forum
              nyanbinary@infosec.exchange
              wrote last edited by
              #9

              @rx13 @da_667 ...oh we are 100℅ baking that into some response scripts

              nyanbinary@infosec.exchangeN rx13@infosec.exchangeR 2 Replies Last reply
              0
              • da_667@infosec.exchangeD da_667@infosec.exchange

                @kallisti It's a complicated subject. Free hosting is usually fine, but just like every other free hosting service on the internet, somebody is bound to fuck it up and abuse it. My beef is that cloudflare is kinda lax on handling their abuse claims.

                kallisti@infosec.exchangeK This user is from outside of this forum
                kallisti@infosec.exchangeK This user is from outside of this forum
                kallisti@infosec.exchange
                wrote last edited by
                #10

                @da_667

                Fair enough.
                I'd add that the "somebody is bound to fuck it up and abuse it" part applies to any piece of software and/or infrastructure, and putting things behind a paywall (i.e. making it inaccessible for people on a budget) should never be the solution.

                But handling abuse accurately and decisively, is, as you said yourself, the way to go and something to be expected especially from a company that big.

                da_667@infosec.exchangeD 1 Reply Last reply
                0
                • nyanbinary@infosec.exchangeN nyanbinary@infosec.exchange

                  @rx13 @da_667 ...oh we are 100℅ baking that into some response scripts

                  nyanbinary@infosec.exchangeN This user is from outside of this forum
                  nyanbinary@infosec.exchangeN This user is from outside of this forum
                  nyanbinary@infosec.exchange
                  wrote last edited by
                  #11

                  @rx13 @da_667 ...checks docs

                  email: string
                  A valid email of the abuse reporter. This field may be released by Cloudflare to third parties such as the Lumen Database (https://lumendatabase.org/).

                  email2: string
                  Should match the value provided in email

                  Lol

                  1 Reply Last reply
                  0
                  • kallisti@infosec.exchangeK kallisti@infosec.exchange

                    @da_667

                    Fair enough.
                    I'd add that the "somebody is bound to fuck it up and abuse it" part applies to any piece of software and/or infrastructure, and putting things behind a paywall (i.e. making it inaccessible for people on a budget) should never be the solution.

                    But handling abuse accurately and decisively, is, as you said yourself, the way to go and something to be expected especially from a company that big.

                    da_667@infosec.exchangeD This user is from outside of this forum
                    da_667@infosec.exchangeD This user is from outside of this forum
                    da_667@infosec.exchange
                    wrote last edited by
                    #12

                    @kallisti that's my big problem is that they aren't particularly good or fast at handling abuse claims. But like, take pastebin for instance. There was a period of time where it was heavily abused, and in spite of NOT being a gigantic company, they actually move pretty fast to remove malicious pastes. That's the difference. pastebin is free, and they actually care about not being a festering malware host.

                    da_667@infosec.exchangeD 1 Reply Last reply
                    0
                    • da_667@infosec.exchangeD da_667@infosec.exchange

                      @kallisti that's my big problem is that they aren't particularly good or fast at handling abuse claims. But like, take pastebin for instance. There was a period of time where it was heavily abused, and in spite of NOT being a gigantic company, they actually move pretty fast to remove malicious pastes. That's the difference. pastebin is free, and they actually care about not being a festering malware host.

                      da_667@infosec.exchangeD This user is from outside of this forum
                      da_667@infosec.exchangeD This user is from outside of this forum
                      da_667@infosec.exchange
                      wrote last edited by
                      #13

                      @kallisti its still a problem, but they're mindful of it.

                      1 Reply Last reply
                      0
                      • nyanbinary@infosec.exchangeN nyanbinary@infosec.exchange

                        @rx13 @da_667 ...oh we are 100℅ baking that into some response scripts

                        rx13@infosec.exchangeR This user is from outside of this forum
                        rx13@infosec.exchangeR This user is from outside of this forum
                        rx13@infosec.exchange
                        wrote last edited by
                        #14

                        @nyanbinary @da_667
                        Yeah, I've spent the last few days creating a Tracecat pipeline that greps logs for phishing domains coming to our platform (attackers don't get to control browsers, so we always get a nice 'referrer' value from where they're sending customers for phishing)

                        Now, it parses the last timeblock of logs filtered to domains that aren't our topN, and does a whois/tls cert check against each one, if the whois reg date is ❤ months, and the cert belongs to cloudflare, they get automated takedown requests

                        1 Reply Last reply
                        1
                        0
                        • R relay@relay.infosec.exchange shared this topic
                        Reply
                        • Reply as topic
                        Log in to reply
                        • Oldest to Newest
                        • Newest to Oldest
                        • Most Votes


                        • Login

                        • Login or register to search.
                        • First post
                          Last post
                        0
                        • Categories
                        • Recent
                        • Tags
                        • Popular
                        • World
                        • Users
                        • Groups