#dnsrecords โ Public Fediverse posts
Live and recent posts from across the Fediverse tagged #dnsrecords, aggregated by home.social.
-
๐ฆ๐ฃ๐ ๐ต๐ฎ๐ ๐ฎ ๐ญ๐ฌ-๐น๐ผ๐ผ๐ธ๐๐ฝ ๐น๐ถ๐บ๐ถ๐. ๐ ๐ผ๐๐ ๐ฝ๐ฒ๐ผ๐ฝ๐น๐ฒ ๐ณ๐ถ๐ป๐ฑ ๐ผ๐๐ ๐๐ต๐ฒ ๐ต๐ฎ๐ฟ๐ฑ ๐๐ฎ๐.
above 10 DNS the entire SPF check returns permerror
I see this constantly
A company adds a new ESP
their IT team appends another `include:`
and suddenly legitimate email bounces
The fix isn't removing services
It's flattening
resolving nested includes into direct IP ranges
-
๐ฎ๐คฏ "Can we stuff 1993's #DOOM into 2k #DNS records?" asks the nerdiest corner of the internet. Sure, because what else would you do with your weekends other than turning a classic FPS into a DNS-based tech puzzle that no one asked for? ๐ ๐ง
https://core-jmp.org/2026/03/can-it-resolve-doom-game-engine-in-2000-dns-records/ #DNSRecords #TechPuzzle #GamingNostalgia #HackerNews #ngated -
Tomโs Hardware: Mad lad stores and loads Doom from within DNS โ TXT record type abused to store game data. โNetwork administrators in the audience are advised to grab their unsee juice from the shelf, as todayโs home project is quite the double-whammy. First, it involves everyoneโs favorite problem child, DNS. Second, a madlad named Adam Rice has managed to put Doom in it. Thatโs a paragraph [โฆ]
https://rbfirehose.com/2026/03/26/toms-hardware-mad-lad-stores-and-loads-doom-from-within-dns-txt-record-type-abused-to-store-game-data/ -
@bart heard me say when I moved my server that I didnโt really understand all of the DNS record stuff @tage told me to do. In this nerdier-than-usual Chit Chat Across the Pond, Bart explains all of it and teaches us about email sender validation. His explanation will help you to be able to send mail from your server that actually arrives at the intended inboxes.
-
Hardening My Domain Email with SPF, DKIM, DMARC
After spotting spoofed emails from my domain, I finally secured islandinthenet.com with SPF, DKIM, and DMARC.
-
Security Pattern: Email Spoofing Protection via DMARC, SPF, and DKIM
This post outlines a practical email security pattern using SPF, DKIM, and DMARC to stop spoofing and protect your domainโs reputation.
https://islandinthenet.com/security-pattern-email-spoofing-protection-via-dmarc-spf-and-dkim/
-
Hello everyone.
In today's article, we will examine in detail what is dns and how it works.
I wish everyone a good reading:
https://denizhalil.com/2023/07/04/what-is-dns-an-overview-of-the-domain-name-system/#dns #domainnamesystem #networksecurity #dnssecurity #dnsrecords #dnsconfiguration
-
Title: "๐ป๐ #MacOSBackdoor: Stealthy Malware in Cracked Apps Drains Wallets via DNS Records ๐จ"
Recent reports from Securelist and BleepingComputer reveal a sophisticated malware campaign targeting macOS users. Authored by Sergey Puzan (Securelist) and Bill Toulas (BleepingComputer), these articles uncover a cunning method where hackers disguise information-stealing malware within cracked macOS applications. This threat primarily affects macOS Ventura users and leverages DNS records to conceal malicious scripts. The malware, disguised as a legitimate app activator, prompts users for admin passwords, thus gaining control over the system.
The malware establishes contact with its command and control (C2) server via a unique URL, generated by combining words from hardcoded lists with random letters, and then fetches a base64-encoded Python script from DNS TXT records. This script not only provides backdoor access but also harvests and transmits critical system information. Further, it ensures persistence across reboots and continuously updates itself.
What's alarming is the malware's capability to replace Bitcoin Core and Exodus wallets with compromised versions that transmit users' sensitive data to the attackers. The ingenuity of hiding the payload in DNS server TXT records marks a new level of sophistication in cyber attacks.
Stay vigilant and avoid cracked software to mitigate such threats!
Tags: #CyberSecurity #Infosec #MalwareAnalysis #MacOS #DNSRecords #PythonScript #APT #Securelist #BleepingComputer #SergeyPuzan #BillToulas
Sources:
- Securelist: Sergey Puzan's Article
- BleepingComputer: Bill Toulas's Article