home.social

#dnsrecords โ€” Public Fediverse posts

Live and recent posts from across the Fediverse tagged #dnsrecords, aggregated by home.social.

  1. ๐—ฆ๐—ฃ๐—™ ๐—ต๐—ฎ๐˜€ ๐—ฎ ๐Ÿญ๐Ÿฌ-๐—น๐—ผ๐—ผ๐—ธ๐˜‚๐—ฝ ๐—น๐—ถ๐—บ๐—ถ๐˜. ๐— ๐—ผ๐˜€๐˜ ๐—ฝ๐—ฒ๐—ผ๐—ฝ๐—น๐—ฒ ๐—ณ๐—ถ๐—ป๐—ฑ ๐—ผ๐˜‚๐˜ ๐˜๐—ต๐—ฒ ๐—ต๐—ฎ๐—ฟ๐—ฑ ๐˜„๐—ฎ๐˜†.

    above 10 DNS the entire SPF check returns permerror

    I see this constantly

    A company adds a new ESP

    their IT team appends another `include:`

    and suddenly legitimate email bounces

    The fix isn't removing services

    It's flattening

    resolving nested includes into direct IP ranges

    dmarcguard.io/tools/spf-flatte

    #DMARC #EmailSecurity #SPF #DNSRecords

  2. ๐ŸŽฎ๐Ÿคฏ "Can we stuff 1993's #DOOM into 2k #DNS records?" asks the nerdiest corner of the internet. Sure, because what else would you do with your weekends other than turning a classic FPS into a DNS-based tech puzzle that no one asked for? ๐Ÿ˜…๐Ÿ”ง
    core-jmp.org/2026/03/can-it-re #DNSRecords #TechPuzzle #GamingNostalgia #HackerNews #ngated

  3. Tomโ€™s Hardware: Mad lad stores and loads Doom from within DNS โ€” TXT record type abused to store game data. โ€œNetwork administrators in the audience are advised to grab their unsee juice from the shelf, as todayโ€™s home project is quite the double-whammy. First, it involves everyoneโ€™s favorite problem child, DNS. Second, a madlad named Adam Rice has managed to put Doom in it. Thatโ€™s a paragraph [โ€ฆ]

    https://rbfirehose.com/2026/03/26/toms-hardware-mad-lad-stores-and-loads-doom-from-within-dns-txt-record-type-abused-to-store-game-data/
  4. @bart heard me say when I moved my server that I didnโ€™t really understand all of the DNS record stuff @tage told me to do. In this nerdier-than-usual Chit Chat Across the Pond, Bart explains all of it and teaches us about email sender validation. His explanation will help you to be able to send mail from your server that actually arrives at the intended inboxes.

    podfeet.com/blog/2025/12/ccatp

    #DNSRecords #ServerAdministration

  5. Hardening My Domain Email with SPF, DKIM, DMARC

    After spotting spoofed emails from my domain, I finally secured islandinthenet.com with SPF, DKIM, and DMARC.

    islandinthenet.com/spf-dkim-an

  6. Security Pattern: Email Spoofing Protection via DMARC, SPF, and DKIM

    This post outlines a practical email security pattern using SPF, DKIM, and DMARC to stop spoofing and protect your domainโ€™s reputation.

    islandinthenet.com/security-pa

  7. Title: "๐Ÿ’ป๐Ÿ”’ #MacOSBackdoor: Stealthy Malware in Cracked Apps Drains Wallets via DNS Records ๐Ÿšจ"

    Recent reports from Securelist and BleepingComputer reveal a sophisticated malware campaign targeting macOS users. Authored by Sergey Puzan (Securelist) and Bill Toulas (BleepingComputer), these articles uncover a cunning method where hackers disguise information-stealing malware within cracked macOS applications. This threat primarily affects macOS Ventura users and leverages DNS records to conceal malicious scripts. The malware, disguised as a legitimate app activator, prompts users for admin passwords, thus gaining control over the system.

    The malware establishes contact with its command and control (C2) server via a unique URL, generated by combining words from hardcoded lists with random letters, and then fetches a base64-encoded Python script from DNS TXT records. This script not only provides backdoor access but also harvests and transmits critical system information. Further, it ensures persistence across reboots and continuously updates itself.

    What's alarming is the malware's capability to replace Bitcoin Core and Exodus wallets with compromised versions that transmit users' sensitive data to the attackers. The ingenuity of hiding the payload in DNS server TXT records marks a new level of sophistication in cyber attacks.

    Stay vigilant and avoid cracked software to mitigate such threats!

    Tags: #CyberSecurity #Infosec #MalwareAnalysis #MacOS #DNSRecords #PythonScript #APT #Securelist #BleepingComputer #SergeyPuzan #BillToulas

    Sources: