Тёмный

DEF CON 31 Recon Village - Anthony Russell - Bug Bounty Recon Bypassing Geographic DNS with Ensemble 

Recon Village
Подписаться 3 тыс.
Просмотров 1,7 тыс.
50% 1

Most bug bounty hunters are missing a huge attack surface when conducting their scans. Often large companies have GeoDNS enabled. If a hunter doesn’t actively bypass GeoDNS by toggling multiple different proxies, or VPNs in different regions, then the hunter only sees the services running on the server located closest to them geographically. The issue with this is that companies often have different services running on servers in different regions. All of which the hunter is missing during their recon phase.
Ensemble, a free open-source tool being released during Defcon 31, will solve this issue. By creating a load balanced, regionally distributed cluster of nodes and a friendly web portal to control them, Ensemble allows attackers to run identical commands simultaneously across multiple geographic regions. The results of the scans are then aggregated and returned to the hunter in an easy-to-use web platform. These commands can then be scheduled to run regularly so that hunter can get back to focusing on the technical details and not need to focus on manually switching proxy locations, VPNs, and rerunning the same commands over and over again which is highly error prone.
------------------------------------------------------------------------------------------------------------------------------------------
This talk was recorded at the ‪@ReconVillage‬ at ‪@DEFCONConference‬ 31, Hotel Linq, Las Vegas.
For more updates and announcements, follow us on
Twitter: / reconvillage
LinkedIn: / reconvillage
RU-vid: / reconvillage
DEFCON Mastadon: defcon.social/...
Cheers,
Recon Village Team.

Опубликовано:

 

16 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 3   
@nadakuditigopikrishna6587
@nadakuditigopikrishna6587 11 месяцев назад
Thanks for sharing this great info and tool.
@SteveStonebraker_brakertech
This was a great talk , thanks for sharing!
@DotNetRussell
@DotNetRussell Год назад
Thanks for watching
Далее
Breaking the x86 Instruction Set
44:29
Просмотров 360 тыс.
Why Def Con 31 SUCKED - Full recap & review | Ep. 38
14:04