SlideShare a Scribd company logo
1 of 79
Domain
Data
into
Domain
Intellige
nce
Chris “tweedge”
Partridge
[~] whois -h
tweedge
▪ Founder of
dnstrace.pro
▪ Third year RIT CSEC
student and BSides
regular
▪ Runs Snort on own
network
▪ Guacamole aficionado
▪ Dungeons and Dragons
Contents
1.Quick Refresher on
DNS
2.The Reactive Threat
Intelligence Problem
3.Scraping and
Ingesting DNS Data at
Scale
4.Anomalies, Analysis
and General Findings
Quick
Refreshe
r on DNS
Section 0
DNS Basics
https://www.facebook.c
om/login/
▪ The protocol:
https://
▪ The page: /login/
▪ FQDN:
www.facebook.com
▫ TLD: com
Registrable domain:
What Can it
Tell You?
A IPv4 address
AAAA IPv6 address
ANY all records
CNAME canonical name
MX mailserver
NS nameserver
TXT text
And more...
How Does it
Work?
DNS is a hierarchical
system.
Y
o
u
Yo
ur
DN
S
Root
DNS
.com
DNS
Facebo
ok DNS
The
Reactive
Threat
Intellig
ence
Problem
Section 1
Reactive
Security !=
Great Security
▪ Consider 100% file-
signature-based
antimalware
▫ Easy to circumvent
▫ Difficult/costly to
maintain
▫ Slow to adapt
▪ Better than nothing?
¯_( ツ )_/¯
“
An IP address
earns a
negative
reputation
when
Symantec
detects
suspicious
activity, such
“
An IP address
earns a
negative
reputation
when
Symantec
detects
suspicious
activity, such
“
...If the IP
addresses
change
frequently,
and if the
site has an
IP address
that was
hosting
“
...If the IP
addresses
change
frequently,
and if the
site has an
IP address
that was
hosting
▪ Domain safety
heuristics are
available
▫ How recent the
registration was
▫ Frequent address
changes
▫ Popularity
estimates
It’s a Start
Relational
Learning
“To predict unforseen
or future relationships
between entities based
on past observations.”
Relational
Threat
Intelligence
Mal
ware
X
Interacts
with
C:UsersChri
s
Modifies
startup
settings
Loads
cryptographic
libraries
Outbound
HTTP GET
... nearly
limitless
characteristics ..
.
Relational
Threat
Intelligence
Doma
in X
Resolves to
certain IPsResolves to
certain other
domains
Was
registered by
_ registrar
Has certain
text records
... some other
characteristic
s ...
What Would We
Need?
▪ Huge quantities of
parsed domain data
▫ Some collect this
passively; we won’t
▫ Difficult to acquire
aggressively
▪ As much threat
intelligence as
possible
Scraping
and
Ingesting
DNS Data
at Scale
Section 2
Acquiring TLDs
http://data.iana.org/TL
D/tlds-alpha-by-
domain.txt
Stats:
▪ 1543 TLDs
▪ Available by HTTP
▪ Also by FTP
▪ Wow
Acquiring
Domains
▪ Buy access to
curated zone files
▫ ~$300/year ( ° °)╯ □ ╯ ︵
┻━┻
▪ Request access to
zone files from
registrars
▫ ICANN’s CZDS is a
good start
Discovering
Domains &
Subdomains
Out of
Scope
▪ Brute
force
▪ Website
crawling
▪ Search
engines &
passive
In Scope
▪ Probabilis
tic
lookups
▪ Reverse
DNS
▪ Using
DNSSEC:
NSEC and
Brute Force
Lookups
Recommended software:
shutdown -Ph now
Website
Crawling
▪ Find and follow links
▪ Complex and resource
intensive if the entire
document is rendered
for each page
▪ Requires a webserver
to be running
Search Engines
& Passive DNS
▪ Great for real-life
engagements, exposes
nothing about your
recon to a target
▪ Depends on external
services
Recommended software:
Probabilistic
Lookups
▪ Use a list of known
FQDNs and parse out
the most common
subdomains
▪ Combine with anything
you know about the
target (eg.
wordlists) to
increase
Reverse DNS
▪ Useful for IPv4
(dense), less useful
for IPv6 (sparse)
▪ Often results in ISP-
assigned FQDNs
▪ ...hrm.
DNSSEC
▪ A set of security
extensions for DNS
▪ Provides:
▫ Origin authentication
▫ Data integrity
▫ Denial of existence
NSEC Walks
▪ How does denial of
existence work with
DNSSEC?
▫ NS returns NSEC
response: “next secure
record”
Generally:
examp
le.com
api
ww
w
User
requests
“test”
NS
returns
1624 IN NSEC
www.example.com.
A NS SOA TXT AAAA
RRSIG NSEC DNSKEY
NSEC3 Walks
▪ Privacy improvements in
2008 to DNSSEC,
creating NSEC3 records
by hashing adjacent
valid records
Generally:
examp
le.com
api
ww
w
User requests “test”
NS returns NSEC3
record stating:
“There is nothing between
‘71f64b...’ and ‘724611...’”
DNSSEC, NSEC,
NSEC3 Recap
▪ If a target has
DNSSEC enabled it’s
absolutely worth
investigating an
NSEC(3) walk
▪ NSEC scales well,
NSEC3 does not (on
CPU)
▪ NSEC5 on the way
Zone Transfers
(AXFR Query)
▪ Ask the nameserver
politely for all its
zone data
▪ Between 1/7 and 1/10
nameservers allow
AXFR
▪ Requires little effort
for possibly large
payout
North Korea
DNS Leak
Found by
mandatoryprogrammer/
TLDR
Sept. 2016, 28 domains:
airkoryo.com.kp, cooks.org.kp,
friend.com.kp, gnu.rep.kp,
kass.org.kp, kcna.kp,
kiyctc.com.kp, knic.com.kp,
koredufund.org.kp,
korelcfund.org.kp,
Resolving the
Domain Space
▪ The DIY solution
1.Try an AXFR (if
applicable)
2.Try an ANY query
3.Iterate through
desired query types
▪ Thread and
geographically
distribute
Make Use of
Open Domain
Data
Rapid7 Sonar
▪ SSL, Forward DNS, and
Reverse DNS = great
▪ Approx. 2.3 billion
data points per week
in FDNS
▪ Permits non-malicious
noncommercial use
Storing
Everything
▪ Decompose everything
▪ Use scalable database
engines
▫ Current setup:
Percona 5.6 with
TokuDB
▪ Compression works
wonders
▪ Indexes are your
Anomalie
s,
Analysis,
and
General
Findings
Section 3
Domain Errors
▪ a104-100-169-
118.depl1521945933
▪ sxevz.www.ae01521990
153
▪ dc-wpprod-f5
▪ nic.llc
▪ mac.sport
LLC Isn’t a
TLD? Sport?
▪ IANA says yes:
▪ Mozilla’s Public
Suffix List says no:
Here We Go!
Invalid Types
▪ a104-100-169-
118.depl1521945933
Type: ec2-52-39-
231 ..., reply: a
▪ dc-wpprod-f5
Type: canam.ws,
reply: a
IPv4 / DNS A
IPv6 vs IPv4
CNAME Mistakes
▪ http://exmail.qq.com/
login
▪ ms28789472.msv1.inval
id
▪ 6ca0fe83df737a7b1a6
003830fc47008
▪ www.tuolongledcom
▪ fdfddfdf.343sdfd.fddd
MX and NS
Errors
Achieving
Proactiv
e
Intellig
ence
Section 4
Adding Threat
Intelligence
▪ Ingest as many lists
as possible
▫ Phishing feeds of
URLs
▫ Domain reputation
feeds
▫ IP reputation feeds
▫ BOGONs
▪ Considering heuristics
Tuning Threat
Intelligence
▪ Threat intel source
reputation
▪ Threat type and
severity
▪ User bias based on
threat category
Limitatio
ns and
Future
Improve
ments
Section 5
Limitations
▪ Data is far from
complete at the
moment
▪ Threat intelligence
sources are good, not
great
▫ Response time to
emerging threats is
slow
Limitations
Future
Improvements
▪ Talk to a lawyer
▪ Scale out, cover more
geographic areas,
increase query
throughput
▫ You can help!
▪ Implement
distributed NSEC
walking, AXFRs
The Endgame
▪ Make dnstrace a
proactive tool for
geeks
▫ Generate firewall
configurations
▫ Generate DNS
blocklists
▪ Make dnstrace a
proactive tool for
Open
Discussio
n
Section 6
Questio
ns?
Commen
ts?
This is the Last
Slide-
Thank you so much for
coming to my talk!
Keep in touch via ...
Email
chris@partridge.tech
LinkedIn /in/tweedge/
GitHub? @tweedge

More Related Content

What's hot

Caching Up and Down the Stack
Caching Up and Down the StackCaching Up and Down the Stack
Caching Up and Down the StackDan Kuebrich
 
The KNOT DNS Server
The KNOT DNS ServerThe KNOT DNS Server
The KNOT DNS ServerMen and Mice
 
The CAA-Record for increased encryption security
The CAA-Record for increased encryption securityThe CAA-Record for increased encryption security
The CAA-Record for increased encryption securityMen and Mice
 
Back to Basics Spanish Webinar 3 - Introducción a los replica sets
Back to Basics Spanish Webinar 3 - Introducción a los replica setsBack to Basics Spanish Webinar 3 - Introducción a los replica sets
Back to Basics Spanish Webinar 3 - Introducción a los replica setsMongoDB
 
distributed tracing in 5 minutes
distributed tracing in 5 minutesdistributed tracing in 5 minutes
distributed tracing in 5 minutesDan Kuebrich
 
Back to Basics Spanish 4 Introduction to sharding
Back to Basics Spanish 4 Introduction to shardingBack to Basics Spanish 4 Introduction to sharding
Back to Basics Spanish 4 Introduction to shardingMongoDB
 
RIPE 70 Report Webinar
RIPE 70 Report WebinarRIPE 70 Report Webinar
RIPE 70 Report WebinarMen and Mice
 
Forensics perspective ERFA-møde marts 2017
 Forensics perspective ERFA-møde marts 2017 Forensics perspective ERFA-møde marts 2017
Forensics perspective ERFA-møde marts 2017J Hartig
 
Fighting Abuse with DNS
Fighting Abuse with DNSFighting Abuse with DNS
Fighting Abuse with DNSMen and Mice
 
Windows Server 2016 Webinar
Windows Server 2016 WebinarWindows Server 2016 Webinar
Windows Server 2016 WebinarMen and Mice
 
What is new in BIND 9.11?
What is new in BIND 9.11?What is new in BIND 9.11?
What is new in BIND 9.11?Men and Mice
 
Efficient cluster resource management by using Cook and Mesos / Li Jin (Two S...
Efficient cluster resource management by using Cook and Mesos / Li Jin (Two S...Efficient cluster resource management by using Cook and Mesos / Li Jin (Two S...
Efficient cluster resource management by using Cook and Mesos / Li Jin (Two S...Ontico
 
Back to Basics Webinar 6: Production Deployment
Back to Basics Webinar 6: Production DeploymentBack to Basics Webinar 6: Production Deployment
Back to Basics Webinar 6: Production DeploymentMongoDB
 
MongoDB memory management demystified
MongoDB memory management demystifiedMongoDB memory management demystified
MongoDB memory management demystifiedAlon Horev
 

What's hot (20)

A study of our DNS full-resolvers
A study of our DNS full-resolversA study of our DNS full-resolvers
A study of our DNS full-resolvers
 
Caching Up and Down the Stack
Caching Up and Down the StackCaching Up and Down the Stack
Caching Up and Down the Stack
 
The KNOT DNS Server
The KNOT DNS ServerThe KNOT DNS Server
The KNOT DNS Server
 
The CAA-Record for increased encryption security
The CAA-Record for increased encryption securityThe CAA-Record for increased encryption security
The CAA-Record for increased encryption security
 
DNSTap Webinar
DNSTap WebinarDNSTap Webinar
DNSTap Webinar
 
Back to Basics Spanish Webinar 3 - Introducción a los replica sets
Back to Basics Spanish Webinar 3 - Introducción a los replica setsBack to Basics Spanish Webinar 3 - Introducción a los replica sets
Back to Basics Spanish Webinar 3 - Introducción a los replica sets
 
distributed tracing in 5 minutes
distributed tracing in 5 minutesdistributed tracing in 5 minutes
distributed tracing in 5 minutes
 
Network Security Best Practice (BCP38 & 140)
Network Security Best Practice (BCP38 & 140) Network Security Best Practice (BCP38 & 140)
Network Security Best Practice (BCP38 & 140)
 
Back to Basics Spanish 4 Introduction to sharding
Back to Basics Spanish 4 Introduction to shardingBack to Basics Spanish 4 Introduction to sharding
Back to Basics Spanish 4 Introduction to sharding
 
RIPE 70 Report Webinar
RIPE 70 Report WebinarRIPE 70 Report Webinar
RIPE 70 Report Webinar
 
Forensics perspective ERFA-møde marts 2017
 Forensics perspective ERFA-møde marts 2017 Forensics perspective ERFA-møde marts 2017
Forensics perspective ERFA-møde marts 2017
 
Fighting Abuse with DNS
Fighting Abuse with DNSFighting Abuse with DNS
Fighting Abuse with DNS
 
Mongo db intro new
Mongo db intro newMongo db intro new
Mongo db intro new
 
Windows Server 2016 Webinar
Windows Server 2016 WebinarWindows Server 2016 Webinar
Windows Server 2016 Webinar
 
What is new in BIND 9.11?
What is new in BIND 9.11?What is new in BIND 9.11?
What is new in BIND 9.11?
 
Efficient cluster resource management by using Cook and Mesos / Li Jin (Two S...
Efficient cluster resource management by using Cook and Mesos / Li Jin (Two S...Efficient cluster resource management by using Cook and Mesos / Li Jin (Two S...
Efficient cluster resource management by using Cook and Mesos / Li Jin (Two S...
 
ION Tokyo: The Business Case for DNSSEC and DANE, Dan York
ION Tokyo: The Business Case for DNSSEC and DANE, Dan YorkION Tokyo: The Business Case for DNSSEC and DANE, Dan York
ION Tokyo: The Business Case for DNSSEC and DANE, Dan York
 
Root servers
Root serversRoot servers
Root servers
 
Back to Basics Webinar 6: Production Deployment
Back to Basics Webinar 6: Production DeploymentBack to Basics Webinar 6: Production Deployment
Back to Basics Webinar 6: Production Deployment
 
MongoDB memory management demystified
MongoDB memory management demystifiedMongoDB memory management demystified
MongoDB memory management demystified
 

Similar to BSides Rochester 2018: Chris Partridge: Turning Domain Data Into Domain Intelligence

DNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael CasadevallDNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael CasadevallGlenn McKnight
 
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]APNIC
 
DNS in IR: Collection, Analysis and Response
DNS in IR: Collection, Analysis and ResponseDNS in IR: Collection, Analysis and Response
DNS in IR: Collection, Analysis and Responsepm123008
 
Leveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker ActivityLeveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker ActivitySqrrl
 
DNS как линия защиты/DNS as a Defense Vector
DNS как линия защиты/DNS as a Defense VectorDNS как линия защиты/DNS as a Defense Vector
DNS как линия защиты/DNS as a Defense VectorPositive Hack Days
 
DEF CON 27 - GERALD DOUSSOT AND ROGER MEYER - state of dns rebinding attack ...
DEF CON 27 - GERALD DOUSSOT  AND ROGER MEYER - state of dns rebinding attack ...DEF CON 27 - GERALD DOUSSOT  AND ROGER MEYER - state of dns rebinding attack ...
DEF CON 27 - GERALD DOUSSOT AND ROGER MEYER - state of dns rebinding attack ...Felipe Prado
 
A @textfiles approach to gathering the world's DNS
A @textfiles approach to gathering the world's DNSA @textfiles approach to gathering the world's DNS
A @textfiles approach to gathering the world's DNSRob Fuller
 
Domain Name System (DNS) Fundamentals
Domain Name System (DNS) FundamentalsDomain Name System (DNS) Fundamentals
Domain Name System (DNS) FundamentalsWebSniffer
 
Signing DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutionsSigning DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutionsAPNIC
 
dns-sec-4-slides
dns-sec-4-slidesdns-sec-4-slides
dns-sec-4-slideskj teoh
 
DNS Fundamentals Presentation_PANDI-2022.pdf
DNS Fundamentals Presentation_PANDI-2022.pdfDNS Fundamentals Presentation_PANDI-2022.pdf
DNS Fundamentals Presentation_PANDI-2022.pdfroemahtoedjoeh
 
DNS Survival Guide
DNS Survival GuideDNS Survival Guide
DNS Survival GuideAPNIC
 
DNS Survival Guide.
DNS Survival Guide.DNS Survival Guide.
DNS Survival Guide.Qrator Labs
 
Hardening the Core of the Internet
Hardening the Core of the InternetHardening the Core of the Internet
Hardening the Core of the InternetRIPE NCC
 

Similar to BSides Rochester 2018: Chris Partridge: Turning Domain Data Into Domain Intelligence (20)

DNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael CasadevallDNS Over HTTPS by Michael Casadevall
DNS Over HTTPS by Michael Casadevall
 
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
 
DNS in IR: Collection, Analysis and Response
DNS in IR: Collection, Analysis and ResponseDNS in IR: Collection, Analysis and Response
DNS in IR: Collection, Analysis and Response
 
Leveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker ActivityLeveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker Activity
 
DNS Attacks
DNS AttacksDNS Attacks
DNS Attacks
 
DNS как линия защиты/DNS as a Defense Vector
DNS как линия защиты/DNS as a Defense VectorDNS как линия защиты/DNS as a Defense Vector
DNS как линия защиты/DNS as a Defense Vector
 
Hands-on DNSSEC Deployment
Hands-on DNSSEC DeploymentHands-on DNSSEC Deployment
Hands-on DNSSEC Deployment
 
DEF CON 27 - GERALD DOUSSOT AND ROGER MEYER - state of dns rebinding attack ...
DEF CON 27 - GERALD DOUSSOT  AND ROGER MEYER - state of dns rebinding attack ...DEF CON 27 - GERALD DOUSSOT  AND ROGER MEYER - state of dns rebinding attack ...
DEF CON 27 - GERALD DOUSSOT AND ROGER MEYER - state of dns rebinding attack ...
 
A @textfiles approach to gathering the world's DNS
A @textfiles approach to gathering the world's DNSA @textfiles approach to gathering the world's DNS
A @textfiles approach to gathering the world's DNS
 
2 technical-dns-workshop-day1
2 technical-dns-workshop-day12 technical-dns-workshop-day1
2 technical-dns-workshop-day1
 
Domain Name System (DNS) Fundamentals
Domain Name System (DNS) FundamentalsDomain Name System (DNS) Fundamentals
Domain Name System (DNS) Fundamentals
 
Signing DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutionsSigning DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutions
 
DNS Security
DNS SecurityDNS Security
DNS Security
 
Tools kali
Tools kaliTools kali
Tools kali
 
dns-sec-4-slides
dns-sec-4-slidesdns-sec-4-slides
dns-sec-4-slides
 
DNS Fundamentals Presentation_PANDI-2022.pdf
DNS Fundamentals Presentation_PANDI-2022.pdfDNS Fundamentals Presentation_PANDI-2022.pdf
DNS Fundamentals Presentation_PANDI-2022.pdf
 
ION Islamabad - Deploying DNSSEC
ION Islamabad - Deploying DNSSECION Islamabad - Deploying DNSSEC
ION Islamabad - Deploying DNSSEC
 
DNS Survival Guide
DNS Survival GuideDNS Survival Guide
DNS Survival Guide
 
DNS Survival Guide.
DNS Survival Guide.DNS Survival Guide.
DNS Survival Guide.
 
Hardening the Core of the Internet
Hardening the Core of the InternetHardening the Core of the Internet
Hardening the Core of the Internet
 

More from JosephTesta9

BSides Rochester 2018: Chaim Sanders: Easily Deploying and Optimizing Open So...
BSides Rochester 2018: Chaim Sanders: Easily Deploying and Optimizing Open So...BSides Rochester 2018: Chaim Sanders: Easily Deploying and Optimizing Open So...
BSides Rochester 2018: Chaim Sanders: Easily Deploying and Optimizing Open So...JosephTesta9
 
BSides Rochester 2018: Chaim Sanders: How the Cookie Crumbles: Modern HTTP St...
BSides Rochester 2018: Chaim Sanders: How the Cookie Crumbles: Modern HTTP St...BSides Rochester 2018: Chaim Sanders: How the Cookie Crumbles: Modern HTTP St...
BSides Rochester 2018: Chaim Sanders: How the Cookie Crumbles: Modern HTTP St...JosephTesta9
 
BSides Rochester 2018: Justin Moore: Automated HTTP Request Repeating With Bu...
BSides Rochester 2018: Justin Moore: Automated HTTP Request Repeating With Bu...BSides Rochester 2018: Justin Moore: Automated HTTP Request Repeating With Bu...
BSides Rochester 2018: Justin Moore: Automated HTTP Request Repeating With Bu...JosephTesta9
 
BSides Rochester 2018: Dave Kukfa: BinDbg: Easy Windows Debugging for Binary ...
BSides Rochester 2018: Dave Kukfa: BinDbg: Easy Windows Debugging for Binary ...BSides Rochester 2018: Dave Kukfa: BinDbg: Easy Windows Debugging for Binary ...
BSides Rochester 2018: Dave Kukfa: BinDbg: Easy Windows Debugging for Binary ...JosephTesta9
 
BSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open Source
BSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open SourceBSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open Source
BSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open SourceJosephTesta9
 
BSides Rochester 2018: Michael West: Sentry, Or: How I Learned To Stop Worryi...
BSides Rochester 2018: Michael West: Sentry, Or: How I Learned To Stop Worryi...BSides Rochester 2018: Michael West: Sentry, Or: How I Learned To Stop Worryi...
BSides Rochester 2018: Michael West: Sentry, Or: How I Learned To Stop Worryi...JosephTesta9
 
BSides Rochester 2018: Lee Kagan: Red and Blue Ping Pong
BSides Rochester 2018: Lee Kagan: Red and Blue Ping PongBSides Rochester 2018: Lee Kagan: Red and Blue Ping Pong
BSides Rochester 2018: Lee Kagan: Red and Blue Ping PongJosephTesta9
 
BSides Rochester 2018: Jonathan Myers: IoT Malware Detection with Machine Lea...
BSides Rochester 2018: Jonathan Myers: IoT Malware Detection with Machine Lea...BSides Rochester 2018: Jonathan Myers: IoT Malware Detection with Machine Lea...
BSides Rochester 2018: Jonathan Myers: IoT Malware Detection with Machine Lea...JosephTesta9
 
BSides Rochester 2018: Issa Hafiri & Christian Halbert: IOT Devices (And Why ...
BSides Rochester 2018: Issa Hafiri & Christian Halbert: IOT Devices (And Why ...BSides Rochester 2018: Issa Hafiri & Christian Halbert: IOT Devices (And Why ...
BSides Rochester 2018: Issa Hafiri & Christian Halbert: IOT Devices (And Why ...JosephTesta9
 
BSides Rochester 2018: Esteban Rodriguez: Ducky In The Middle: Injecting keys...
BSides Rochester 2018: Esteban Rodriguez: Ducky In The Middle: Injecting keys...BSides Rochester 2018: Esteban Rodriguez: Ducky In The Middle: Injecting keys...
BSides Rochester 2018: Esteban Rodriguez: Ducky In The Middle: Injecting keys...JosephTesta9
 
BSides Rochester 2018: Drew Kirkpatrick: Open Source SAST and DAST Tools for ...
BSides Rochester 2018: Drew Kirkpatrick: Open Source SAST and DAST Tools for ...BSides Rochester 2018: Drew Kirkpatrick: Open Source SAST and DAST Tools for ...
BSides Rochester 2018: Drew Kirkpatrick: Open Source SAST and DAST Tools for ...JosephTesta9
 
BSides Rochester 2018: Anthony DiDonato: Virtualization Based Security
BSides Rochester 2018: Anthony DiDonato: Virtualization Based SecurityBSides Rochester 2018: Anthony DiDonato: Virtualization Based Security
BSides Rochester 2018: Anthony DiDonato: Virtualization Based SecurityJosephTesta9
 

More from JosephTesta9 (12)

BSides Rochester 2018: Chaim Sanders: Easily Deploying and Optimizing Open So...
BSides Rochester 2018: Chaim Sanders: Easily Deploying and Optimizing Open So...BSides Rochester 2018: Chaim Sanders: Easily Deploying and Optimizing Open So...
BSides Rochester 2018: Chaim Sanders: Easily Deploying and Optimizing Open So...
 
BSides Rochester 2018: Chaim Sanders: How the Cookie Crumbles: Modern HTTP St...
BSides Rochester 2018: Chaim Sanders: How the Cookie Crumbles: Modern HTTP St...BSides Rochester 2018: Chaim Sanders: How the Cookie Crumbles: Modern HTTP St...
BSides Rochester 2018: Chaim Sanders: How the Cookie Crumbles: Modern HTTP St...
 
BSides Rochester 2018: Justin Moore: Automated HTTP Request Repeating With Bu...
BSides Rochester 2018: Justin Moore: Automated HTTP Request Repeating With Bu...BSides Rochester 2018: Justin Moore: Automated HTTP Request Repeating With Bu...
BSides Rochester 2018: Justin Moore: Automated HTTP Request Repeating With Bu...
 
BSides Rochester 2018: Dave Kukfa: BinDbg: Easy Windows Debugging for Binary ...
BSides Rochester 2018: Dave Kukfa: BinDbg: Easy Windows Debugging for Binary ...BSides Rochester 2018: Dave Kukfa: BinDbg: Easy Windows Debugging for Binary ...
BSides Rochester 2018: Dave Kukfa: BinDbg: Easy Windows Debugging for Binary ...
 
BSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open Source
BSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open SourceBSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open Source
BSides Rochester 2018: Timothy Duffy: Civic and Humanitarian Open Source
 
BSides Rochester 2018: Michael West: Sentry, Or: How I Learned To Stop Worryi...
BSides Rochester 2018: Michael West: Sentry, Or: How I Learned To Stop Worryi...BSides Rochester 2018: Michael West: Sentry, Or: How I Learned To Stop Worryi...
BSides Rochester 2018: Michael West: Sentry, Or: How I Learned To Stop Worryi...
 
BSides Rochester 2018: Lee Kagan: Red and Blue Ping Pong
BSides Rochester 2018: Lee Kagan: Red and Blue Ping PongBSides Rochester 2018: Lee Kagan: Red and Blue Ping Pong
BSides Rochester 2018: Lee Kagan: Red and Blue Ping Pong
 
BSides Rochester 2018: Jonathan Myers: IoT Malware Detection with Machine Lea...
BSides Rochester 2018: Jonathan Myers: IoT Malware Detection with Machine Lea...BSides Rochester 2018: Jonathan Myers: IoT Malware Detection with Machine Lea...
BSides Rochester 2018: Jonathan Myers: IoT Malware Detection with Machine Lea...
 
BSides Rochester 2018: Issa Hafiri & Christian Halbert: IOT Devices (And Why ...
BSides Rochester 2018: Issa Hafiri & Christian Halbert: IOT Devices (And Why ...BSides Rochester 2018: Issa Hafiri & Christian Halbert: IOT Devices (And Why ...
BSides Rochester 2018: Issa Hafiri & Christian Halbert: IOT Devices (And Why ...
 
BSides Rochester 2018: Esteban Rodriguez: Ducky In The Middle: Injecting keys...
BSides Rochester 2018: Esteban Rodriguez: Ducky In The Middle: Injecting keys...BSides Rochester 2018: Esteban Rodriguez: Ducky In The Middle: Injecting keys...
BSides Rochester 2018: Esteban Rodriguez: Ducky In The Middle: Injecting keys...
 
BSides Rochester 2018: Drew Kirkpatrick: Open Source SAST and DAST Tools for ...
BSides Rochester 2018: Drew Kirkpatrick: Open Source SAST and DAST Tools for ...BSides Rochester 2018: Drew Kirkpatrick: Open Source SAST and DAST Tools for ...
BSides Rochester 2018: Drew Kirkpatrick: Open Source SAST and DAST Tools for ...
 
BSides Rochester 2018: Anthony DiDonato: Virtualization Based Security
BSides Rochester 2018: Anthony DiDonato: Virtualization Based SecurityBSides Rochester 2018: Anthony DiDonato: Virtualization Based Security
BSides Rochester 2018: Anthony DiDonato: Virtualization Based Security
 

Recently uploaded

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

BSides Rochester 2018: Chris Partridge: Turning Domain Data Into Domain Intelligence

Editor's Notes

  1. No questions section at the end re: not an expert. I’m on the mailing list, but this is a discussion, not a lecture.
  2. I know, nobody really likes DNS. me neither.
  3. Strip away request data to get at the parts of a domain
  4. DNS hierarchy - a given NS only knows about itself and its delegates. None are obligated to expose information that isn’t being requested. Replace text-heavy slide with diagram
  5. With the talk about the basics over - what does security in the DNS space look like?
  6. When was this from? What does it mean?
  7. ouch
  8. Getting better? When/where/who?
  9. Even Talos is making reactive decisions, but this time supplemented with proactive heuristics
  10. Reasonable heuristics can help protect people - ok, great. It’s a start. But we don’t have that many heuristics to work with. What about a dynamic address so Bob can access his nextcloud at home?
  11. Requires complex, relational structureAllows for link-based clusteringLower dimensionality and high similarity tend to make systems more effective
  12. Too many characteristics to prove effective for clustering - though specific characteristics and sets of characteristics are classifiable, thus, heuristics
  13. Finite set of characteristics, strong structure of both nodes and characteristics.
  14. We could give it a go
  15. TLDs are easy. TLD holders want you to know that their TLD exists for marketing reasons, technical reasons (parsing), etc
  16. Generally for enumerating domains people buy access to zone files
  17. I’ll make recommendations for discovering out of scope things, and demo discovering in-scope things
  18. Absolutely not. Good lawyer can make it sound like a DoS attack. Especially bad at scale. Read: DDoS.
  19. Limits search to web-only domains, out of scope for the intended function of DNS. Useful in other situations. Lots of options.
  20. Good for limited IRL engagements, can’t perform this at scale due to blacklisting
  21. Can be used with certain limitations at scale. Example assumes randomized brute force search of strlen<=6 at 50% completion using only alpha charset - numbers, dashes, etc. would greatly expand search space
  22. We can usually tell the ISP by AS allocations anyway, but whatever
  23. Implements several new records types including dnskey, rrsig, nsec... dnssec-secured responses can be verified to be signed by the NS, valid, and to prevent an ISP just intercepting/nulling dns responses there is authenticated denial of existence.
  24. Denial of existence you say... how does that work?
  25. Replies with an NSEC record. There is not a standard for NSEC records beyond “the next record signed by the nameserver” but this typically means (in most implementations) the next record that exists/returns data.
  26. hmmmmmmmm
  27. There you have it, example.com replies with the next valid domain. So we can enumerate.
  28. But example.com is too small. Let’s enumerate the DNS footprint of something bigger... say, PayPal. 689 queries. That’s an 80-char wide window, longest subdomain I saw was ~30 chars, so 7 * 10^55 is a good estimate of the 50% brute force space. ONE SEPT-EN-DEC-ILLION TIMES as many queries.
  29. People realized the former was a bad idea and came up with NSEC3, the big change being hashed subdomain results
  30. You can see we get gibberish back - no easy walks to be found here. But that’s not to say they’re not possible - you can collect a list of those hashes and then feed them into a cracking software
  31. Here’s an NSEC3 walk of the .pro TLD - in several seconds we crack 11% of domains using hashcat on a Xeon L5640 CPU with a very bad mask. With a last-gen GPU cracking system and a better mask or wordlist, we could push much higher coverage with little extra investment
  32. Cloudflare’s “DNSSEC done right.” NSEC doesn’t have to be the next existing domain - just has to be the next signed record. So CF generates garbage records to prevent a walk.
  33. Four our project we’d need to create failure cases. NSEC5 prevents enumeration - it’s available but not really used right now
  34. Should not be enabled for production environments. 1/7 numbers from dns arc, marjorie @ ic3. 1/10 is approx. lower bound what I’ve seen so far. Reveals activity beyond reasonable doubt to any DNS admin checking the logs though.
  35. Demo axfr - lots of content. We don’t just get a list of valid domains/subdomains - we get query types and responses too. neat!
  36. We now have a lot of ways of acquiring FQDNs - but we’ve only scratched the surface of resolving that domain space
  37. AXFR first - very little effort to enumerate an entire zone, try it against any registrable domain. Failing that, ANY (since we want all the data). Some service providers are refusing ANY, generally due to complexity and DoS amp. Re: cloudflare. Failing that, iterate through most-wanted types (A, AAAA, CNAME, MX, NS, etc.). We thread heavily and maintain 20 nodes in 6 countries and 3 continents.
  38. Really no reason not to if you’re doing this at the scale we are noncomercially. More scans = more granular data = better maps.
  39. Decompose for faster querying. Much worse performance and utility to select where “10.%” to find everything in the 10.0.0.0/8 space. Useful to have everything that can be an integer represented as an integer, and even FQDNs parsed out into subsections
  40. Not that we have the data we need, let’s start playing with it.
  41. Filing an issue
  42. Hmmmmmm
  43. 0.1% of addresses went to private or loopback addresses - doesn’t seem like much until you consider that’s about 1.2 million addresses. Here’s the breakdown. An additional 0.01% of addresses resolve to 1.1.1.1, so APNIC was right to lend that address to Cloudflare.
  44. Protocol doesn’t belong here, .invalid???, a series of CNAMEs with the same hash-like value, simple errors, keyboard smash????
  45. Localhost is not, in fact, a valid MX or NS record
  46. Phishing: eg openphish, domain reputation: eg spamhaus, IP rep: eg everything in firehol, BOGONs from team cymru
  47. Assign trust ratings based on common criteria to all threat intelligence lists. User bias is a multiplier so they can quickly zero out things not relevant to them (eg. if they don’t mind ads, or want to access a certain cove of ragged sailors)
  48. A map of a hosting provider, beget.tech
  49. I wouldn’t trust that adobe update, would you?
  50. Heroku, 000webhost
  51. Harder decisions - some things will get caught, so we need to find ways to minimize false positives - eg. integrating heuristics for false positive reduction
  52. AWS but limited
  53. GitHub but limited
  54. Considering making some visualizations for estimating our current coverage
  55. Lots of querying power in few areas
  56. Could show map of where we have nodes
  57. This is the end goal - not to just have an investigative tool but a utility that can help people be secure at a domain level with a level of precision and proactivity that has not been executed before.