The DNS protocol has some time, the RFC which define it, 1034 (concepts and facilities) and 1035 (implementation and specification) are from 1987 and like in all the protocols of that time, security in the comunication wasn't a priority, anyone sniffing the network can see which domains visit everyone, let alone the providers of the DNS service, but it has little solution in the short run, Internet depends on this name sistem and there isn't another better with the required infrastructure, right?
Well, it seems that the Tor SOCKS proxy interface
offers a non standard option (point 2)
which allows to use this network to resolve names, this functionality can be
accessed from the command line through
this capability can be exploited to build a private DNS server which don't
filter the domain name lookups to the network.
Using Twisted is simple to build a this DNS server
to use the Tor network as a resolver backend (is going to be limited to the
A and AAAA records),
this is implemented in Onion-dir
(At Gitorious | At Github).
This may be used adding the parameter
DNSPort 53 to the
the performance may look like an issue but after testing it the results were
pretty good, to a local
bind9 server it takes ~52s to solve every IP from the
"100 most popular webs"
and Tor does it in ~58s (both times with the cache empty), with cached results
it takes ~2.8s for both.
But there is some problems looking up domains like _xmppconnect.gmail.com, the Google XMPP server, domains which on the other hand actually doesn't exists.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
And that seems the main problem left...
Ever wondered how a vulnerability scan is seen from the server? Well, not very quiet :P
In real time, if every ball represents a petition, the ones who bounce are the one answered succesfully and the other ones do not:
Visualized with logstalgia
Ansible is a radically simple IT orchestration engine that makes your applications and systems easier to deploy. Avoid writing scripts or custom code to deploy and update your applications— automate in a language that approaches plain English, using SSH, with no agents to install on remote systems.
That looks really, really good, I'm testing it now and works great, it may be what you where looking for :P.
Takes the zombie parent process id as parameter and uses GDB to waitpid them surely it'll need root.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
Sometimes may be useful to detect a text language, NIX systems usually have a directory containing the mostly used words of various languages, simply comparing the numbers yielded from checking which words of the text appear there seem* to give a significative number regarding which language the text is written in.
Últimamente encuentro bastantes sítios de humor por aquí dejo los que he encontrado (dádle al título del post para ver las imágenes):
- Infosec Reactions “Sólo lo toque y la aplicación se cayó sola”
- Devops Reactions “Desarrollando sin especificaciones”
- the_coding_love(); “Cuando llega un informe de error el viernes a las 4”
- The Joys of Code... aunque este tiene alguno que puede sentar mal
“Cuando los compañeros intentan explicar por que deberíamos programar en Java”
Hace un tiempo vimos como escribir un sencillo antidebugger y como esquivarlo, en ese momento lo evitamos eliminando la llamada a ptrace directamente del binario, ahora veremos como "cazar" la llamada y reemplazarla por la nuestra propia sin tener que tocar el archivo.
Priemero crearemos un archivo con la función que lo reemplazará [faketrace.c]: