serverok.pl is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.

This server runs the snac software and there is no automatic sign-up process.

Site description
lonely small server
Admin email
postmaster@serverok.pl
Admin account
@mend0za@serverok.pl

Search results for tag #dns

BSidesLuxembourg »
@BSidesLuxembourg@infosec.exchange

🔍 Inside the Tech: New Talk Added to BSides Luxembourg

🌐📡 𝗧𝗛𝗘 𝗙𝗢𝗥𝗚𝗢𝗧𝗧𝗘𝗡 𝗙𝗜𝗡𝗚𝗘𝗥𝗣𝗥𝗜𝗡𝗧: 𝗗𝗡𝗦 𝗕𝗔𝗦𝗘𝗗 𝗢𝗦𝗜𝗡𝗧 𝗧𝗘𝗖𝗛𝗡𝗜𝗤𝗨𝗘𝗦 𝗙𝗢𝗥 𝗣𝗥𝗢𝗗𝗨𝗖𝗧 & 𝗦𝗘𝗥𝗩𝗜𝗖𝗘 𝗗𝗜𝗦𝗖𝗢𝗩𝗘𝗥𝗬 – Rishi ( @rxerium )

⚡ Reveal hidden infrastructure in a Talk (40 min) using DNS TXT records to map technologies, dependencies, and external services at scale.

DNS is often treated as infrastructure plumbing, but TXT records quietly expose far more than most defenders realize. This session introduces a DNS-based OSINT methodology that leverages large-scale TXT record analysis to uncover embedded service dependencies such as cloud platforms, SaaS integrations, and identity providers.

By programmatically scanning DNS zones and integrating the technique into tools like Nuclei and OWASP Amass, this approach enables security teams to build detailed maps of organizational technology stacks and attack surfaces. A real-world case study from the Salesloft breach demonstrates how these signals translate into actionable intelligence for both offensive and defensive use cases.

Rishi ( @rxerium ) is a London-based security researcher focused on vulnerability research, threat intelligence, and OSINT-driven attack surface discovery. He contributes to open-source security tooling, supports the UK OSINT community, and focuses on building scalable reconnaissance and detection methodologies.

📅 Conference Dates: 6–8 May 2026 | 09:00–18:00
📍 14, Porte de France, Esch-sur-Alzette, Luxembourg
🎟️ Tickets: 2026.bsides.lu/tickets/

📅 Schedule Link: pretalx.com/bsidesluxembourg-2

📲 View full schedule & build your agenda: hackertracker.app/schedule?con

    Ratatosk™ »
    @norsesquirrelgod@c.im

    “Did you know that Bluesky is the secret Tenth Realm?” Thus spake the during a attack of Bluesky.

    A black squirrel wearing an emoji-style “viking” style horned helmet and holding a squirrel-sized sword says “Who dares deny service to ME, the mighty Norse Squirrel God, on Bluesky?”

    Alt...A black squirrel wearing an emoji-style “viking” style horned helmet and holding a squirrel-sized sword says “Who dares deny service to ME, the mighty Norse Squirrel God, on Bluesky?”

      OTX Bot » 🤖
      @techbot@social.raytec.co

      CVE-2026-39987 update: How attackers weaponized marimo to deploy a blockchain botnet via HuggingFace

      Three days after disclosure of a critical pre-authorization remote code execution vulnerability in the marimo Python notebook platform, multiple threat actors deployed malware hosted on HuggingFace Spaces. A previously undocumented NKAbuse variant was delivered through a typosquatted HuggingFace Space, utilizing NKN blockchain for command and control. Between April 11-14, 2026, eleven unique source IPs across ten countries generated 662 exploit events. Attack patterns included reverse shell campaigns, credential extraction targeting AWS keys and API tokens, DNS exfiltration, and lateral movement to PostgreSQL and Redis databases via leaked credentials. The malware binary was disguised as a legitimate Kubernetes tool named kagent and implemented persistence through systemd services, crontab entries, and macOS LaunchAgents. This operation demonstrates threat actors specifically targeting AI/ML infrastructure and leveraging trusted platforms for malware distribution.

      Pulse ID: 69e09f9d80e986921250a6f3
      Pulse Link: otx.alienvault.com/pulse/69e09
      Pulse Author: AlienVault
      Created: 2026-04-16 08:36:45

      Be advised, this data is unverified and should be considered preliminary. Always do further verification.

        RamSDRAdmin (R3DHX) »
        @mstadmin@mst.ramsdr.ru

        Вчера вечером "вспомнил старое" и повозился с BIND. Решил DNS сервер для своих доменов поменять. До этого мучил CoreDNS. Из минусов только то, что на одном сервере FreeBSD, а на другом Linux и поэтому с раскаткой чуть больше вопросов было. Зато вспомнил как отрубить рекурсию "для всех кроме", настроить лимиты (чтобы из меня спамера не сделали) и т.д. За сутки лог набежал, проанализировал... Вроде всё ок. :) Приятно, что не потерял навык!

          securityskeptic :donor: :verified: »
          @securityskeptic@infosec.exchange

          How to Protect Against Phishy Top-level Domains

          Blocklisting a domain name or hyperlink (URL) is a common and effective way to avoid becoming a victim of a phishing attack. Phishers and other cyber adversaries often single out specific Top-Level Domains when they register domains for their cyberattacks. And they do so repeatedly! Sometimes they register domains in one TLD at such an enormous scale that blocklisting domains or URLs individually is not enough to mitigate the attack, and more drastic action may effectively reduce risk.

          Today, we’ll explain how use filtering offered by a public, open resolver to reduce your risk to avoid phishy TLDs.

          interisle.substack.com/p/how-t

          a screen capture of the OpenDNS open resolver

          Alt...a screen capture of the OpenDNS open resolver

            1 ★ 1 ↺
            d4s boosted

            mend0za »
            @mend0za@serverok.pl

            Тернистый Путь Греха в сетапе личного PrivateDNS для Android со встроенной баннеро-резалкой.

            Весь мой вчерашний и позавчерашний день, в борьбе с Unbound , DNS-over-TLS , #letsencrypt, AppArmor и, естественно , Linux.

            #unbound опять не запускается

            Alt...#unbound опять не запускается

            #AppArmor мешает #unbound читать сертификаты #letsencrypt

            Alt...#AppArmor мешает #unbound читать сертификаты #letsencrypt