DNS Security: Threat Modeling DNSSEC, DoT, and DoH
WordPress 5.2.4 Security Release Breakdown
Interesting analysis of the Sakula malware used in the aviation thefts mentioned in my previous post.
Chinese airplanes: built by the best technology they could steal.
It's nice to now have a short post by Bruce Schneier I can point to every time someone comes up with "public key crypto is doomed because of quantum computers" FUD: https://www.schneier.com/blog/archives/2019/10/factoring_2048-.html
He's referencing the earlier "factorizing RSA with a 20-million qubit quantum computer" paper, and notes that we're not anywhere near being able to build such a computer. So, yes, RSA is still doomed eventually, but not before some considerable technology leap happens. Quite a way from 100 qbits to 20 million.
My favorite bit:
"who needs microcontrollers when you're running away from cannibals"
'Collapse OS' Is an Open Source Operating System for the Post-Apocalypse
The operating system is designed to work with ubiquitous, easy-to-scavenge components in a future where consumer electronics are a thing of the past.
[A]ndroid [A]pplication [P]entest [G]uide
HostsMan · Windows hosts files management
HostsMan is a freeware application that let's you manage your hosts file with ease.
~Open Source Security Tool of the Day~
Fenrir is a simple IOC scanner bash script.
Never heard this usage before, but now I am intrigued.
AMITT (Adversarial Misinformation and Influence Tactics and Techniques) is a framework designed for describing and understanding disinformation incidents. AMITT is part of misinfosec - work on adapting information security (infosec) practices to help track and counter misinformation, and is designed as far as possible to fit existing #infosec practices and tools.
Framework diagram: https://github.com/misinfosecproject/amitt_framework/blob/master/matrix.md
If you know MITRE ATT&CK Framework, you'll appreciate this!
Top DNS Recon Tools and Techniques
Learn what is DNS enumeration, popular techniques, and tools for your DNS recon process when you are collecting data about your target.
Funny how nobody warning about DoH ever notices that "organisations" could indeed run their own DoH/DoT servers and implement any policy they like https://www.bleepingcomputer.com/news/security/dutch-govt-explains-the-risks-behind-dns-over-https-move/
Main limitation being of course that it would require ten year long transition program as your whole "organisational" DNS runs on some ancient crap commercial or cloud nameserver, who only heard about DoH/DoT in 2019 and it's just as new to them as say IPv6