Me: Threat-hunting rare DNS lookups in a corporate network. Confluence: google.com/search?&q=%22atla…

Dec 4, 2019 · 1:17 AM UTC

30
315
73
1,493
Replying to @SwiftOnSecurity
Did you know you just dropped a 0day on twitter? 😂
11
193
34
1,402
Wait... are you serious? They... actually embed the private cert somewhere? I was just laughing at the domain name.
8
28
5
577
Replying to @SwiftOnSecurity
Thanks for calling our attention to this matter. We did not receive a notification at our SSL_Abuse address. local.connectme.us has been revoked.
1
7
Almost like the CCC talk about HP printers hitting "fakeurl1234.com" -- except in that case, Yaniv and Eyal were able to purchase the domain (which is freakin' hilarious). Write up: cyberwarzone.com/your-hp-pri… Video: media.ccc.de/v/35c3-9462-wha…
1
12
46
Replying to @SwiftOnSecurity
Someone worked on this 0day for months and you just tweeted it out 🤣
44
Replying to @SwiftOnSecurity
DNS requests are often a better way to check on who's doing what on your network than the actual traffic in and out
1
1
Replying to @SwiftOnSecurity
Until DoH
1
1
Replying to @SwiftOnSecurity
Oh dear! The NCSC are an Atlassian customer according to this post ncsc.gov.uk/blog-post/ncsc-i… (they do say it's for content bound for the public domain, so perhaps not quite so concerning to them)