Aggregator
CVE-2024-0753 | Mozilla Firefox up to 115.6 HSTS information disclosure (DLA 3720-1 / EUVD-2024-16542)
CVE-2024-0753 | Mozilla Thunderbird up to 115.6 HSTS information disclosure (DLA 3720-1 / EUVD-2024-16542)
CVE-2024-0750 | Mozilla Thunderbird Popup Notification clickjacking (DLA 3720-1 / Nessus ID 239868)
盛邦安全与中网卫通达成战略合作
近日,远江盛邦安全科技集团股份有限公司(以下简称“盛邦安全”)与南京中网卫星通信股份有限公司(以下简称“中网卫通”)签署战略合作协议,双方将聚焦卫星通信安全领域,充分发挥各自在卫星网络安全技术研发与运营场景落地领域的优势,共同打造卫星通信安全解决方案,构建能源、交通、政府等关键信息基础设施领域的卫星互联网安全防御体系。
盛邦安全作为新型网络安全科技企业,也是国内首家布局卫星互联网的网络安全厂商,凭借深厚的行业积淀与前沿的技术创新能力,在卫星互联网通信安全、卫星互联网脆弱性分析、卫星互联网空间测绘等关键技术领域拥有显著优势,并在卫星互联网安全领域申请了多项专利。
中网卫通作为国内以多卫星通信应用为特色的服务型制造业龙头企业,拥有成熟的卫星网络运营实战经验、丰富的运营资质与完善的基础设施。公司产品、解决方案以及相关服务已经在应急、气象、能源等多个关基领域成功落地,客户遍布全国及“一带一路”客户群体。
双方将在卫星通信安全、数据防护、威胁监测等多个领域展开深度合作,旨在通过资源整合与技术互补,夯实卫星互联网安全根基。聚焦技术共建、市场共拓、应急联动几大核心方向,建立长效沟通机制,推动卫星互联网安全防护方案迭代创新,通过行业标准制定、人才联合培养机制,为卫星互联网安全生态输送复合型技术人才,共同打造覆盖“技术研发-场景验证-市场推广-生态共建”的全链条合作范式。
此次盛邦安全与中网卫通的战略合作,是双方在技术落地、市场深耕层面的强强联合,为关基领域提供更高效的卫星安全防护样本。依托盛邦安全的技术创新能力,结合中网卫星在卫星网络运营中的实战经验,双方将持续深化技术融合与场景创新,为数字经济发展筑牢“天空之盾”。
通达OA OfficeTask前台RCE、SQL注入漏洞分析
一、漏洞概述
注:本文仅以安全研究为目的,分享对该漏洞的挖掘过程,文中涉及的所有漏洞均已报送给国家单位,请勿用做非法用途。
通达OA是国内常用的智能办公系统,为各行业不同规模的众多用户提供信息化管理能力,包括流程审批、行政办公、日常事务、数据统计分析、即时通讯、移动办公等,帮助广大用户降低沟通和管理成本,提升生产和决策效率。
其组件定时任务服务OfficeTask开放udp端口2397,未授权接收数据,并根据数据中的命令控制字符串,执行指定任务。导致存在未授权任意php文件执行、SQL注入漏洞。
二、影响范围
最新版通达OA 13.2(更新时间2025-02-14 13:39)
三、漏洞分析
使用的版本为官网最新版,通达OA(V13版)13.2。下载地址:
安装好后,将创建通达定时任务服务Office_Task,并开机自启动。
通达定时任务服务OfficeTask.exe在0.0.0.0地址开放UDP端口2397,可以被外部直接访问。
OfficeTask.exe从2397端口接收到数据后,根据数据中的命令控制字符串,执行指定任务。命令控制字符串与命令参数以空格分隔,任务包括执行php文件,更新、备份数据库等。
四、前台RCE漏洞
其中命令字符串EXEC_HTTP_TASK_0表示执行指定php文件,命令参数为:php文件名和路径,可控。命令格式为:EXEC_HTTP_TASK_0 \..\poc.php。
最终将创建php.exe进程,将需要执行的php文件拼接上通达OA默认安装路径C:\MYOA\webroot\,一同作为参数传递给php.exe进程执行。具体执行的命令,还会保存到默认目录下的C:\MYOA\logs\Office_Task.log日志文件中。
由于是调用php.exe程序来执行,并不能像日志中看到的那样直接闭合双引号来实现任意命令执行,只能通过执行恶意的php脚本文件来RCE。
php.exe命令执行时通过-f参数传递待执行的php文件,但是这里并不限制文件后缀必须为php。所以可以通过下面的方式分成两步来达到RCE效果。
命令执行成功之后会在网站根目录生成一句话木马,文件路径为webshell /logon.php。
对于旧版本(V12.9及以前的版本)的通达OA需要把EXEC_HTTP_TASK_0替换为EXEC_HTTP_TASK。
五、前台SQL注入漏洞
其中FILE_SORT_UPD_3命令字符串将执行SQL语句update更新数据库表FILE_SORT的内容。
SQL语句中的SORT_ID值和更新的内容可控,未做任何过滤,存在SQL注入漏洞。
比如执行如下FILE_SORT_UPD_3命令:
再查看file_sort表,其中sort_id=1的SORT_NAME数据修改为2,这表明SQL注入已经成功。
通过上面的分析可以看出此漏洞属于update类型的SQL注入漏洞,只能进行盲注,并且不支持多语句。为了更好的利用此漏洞,作者直接给出可以利用此漏洞通过bool盲注获取数据库中管理员用户密码的exp脚本。
对于旧版本(V12.9及以前的版本)的通达OA需要把FILE_SORT_UPD_3替换为FILE_SORT_UPD。
六、参考链接
https://www.ddpoc.com/DVB-2025-8971.html
DayDayMap:开启网络空间测绘“自然语言时代”
在数字化的浪潮中,网络空间资产测绘如同航海家的罗盘,指引着安全从业者穿透迷雾、看清方向、发现威胁。然而,传统测绘平台晦涩难懂的语法规则,宛如高耸的城墙,将众多非技术用户“拒之门外”。许多用户在面对复杂的语法规则时,常常感到无从下手,甚至望而却步。即使是一些有经验的技术人员,也常常因为不同平台间语法的差异,需要花费大量时间去适应和切换,影响了工作效率。
今天,一场革新正悄然来袭!DayDayMap全球网络空间资产测绘平台重磅推出AI语义解析引擎,彻底打破这一僵局,让网络空间测绘迎来 “自然语言时代”。
一、自然语言交互:从“无从入手”到“自由表达”
1、自然语言解锁亿级数据,轻松检索无压力
过往,使用传统测绘工具,用户得先苦练 “语法功底”,熟练掌握诸如 port:21、service=ftp之类的语法规则,并且不同平台的语法大相径庭,用户在切换平台时,还得重新适应,耗费大量精力学习。DayDayMap的自然语言检索功能彻底颠覆了这一逻辑。你只需用最日常的语言,输入“端口为21或服务为FTP的资产”,瞬间,AI引擎便能精准领会你你的意图,会你生成专业、精准的语法【ip.port=21"||.service="ftp"】,轻松解锁亿级数据,让复杂检索变得如此简单,就像日常聊天一样轻松。
2、智能纠错护航,精准查询有保障
即便是资深技术人员,在撰写复杂查询语句时,也难免因疏忽出现语法错误,需要额外花费不少时间进行问题排查。DayDayMap内置的智能语义解析引擎,就像一位细致入微的 “护航员”,能精准识别出语句中的错误,并自动修正,最大程度还原用户的真实意图,大幅提升查询准确率,让你不再为语法错误而烦恼,专注获取关键数据。
二、跨平台与全球化:打破壁垒,连接世界
1. 跨平台语法兼容,打破数据孤岛
在网络攻防实战中,安全人员通常需在多个测绘平台间交叉验证数据,可不同平台间的语法差异,导致查询语句无法复用,浪费了时间和精力。DayDayMap 凭借跨平台异构语法兼容引擎,轻松攻克这一难题。他支持对主流测绘平台语句的转换,能将其他平台的语句快速转换为自身语法体系,从而节省了大量的学习成本。
2. 多语言支持,助力全球协作无阻碍
随着“一带一路”、“企业出海”,越来越多的企业走出国门,将业务向海外拓展。跨国团队面临中英文混杂的数据处理难题。DayDayMap支持中英文混合检索与多语言报告导出,满足在不同文化环境下工作的需要。
结语:测绘无界,未来已来
DayDayMap的AI语义引擎,不仅是技术革新,更是网络空间治理范式的跃迁。不仅让用户感受到了前所未有的便捷和高效,还通过跨平台异构语法兼容和多语言支持等特色功能进一步提升了平台的实用性和国际化水平,为大大提高了测绘数据的检索质量与效率,为学术研究、学术创新、专业检索增效赋能。
作为网络空间资产测绘领域的佼佼者,DayDayMap拥有海量且精准的资产数据,其IPv6资产规模已接近39亿,覆盖全球范围,为用户提供了全面的网络空间资产视图。平台不断创新,已陆续上线 “大语言模型”“电子屏”“iDirect卫星设备” 等热点特色指纹,紧密贴合当下网络空间测绘的前沿需求,助力用户快速发现和应对热点领域的资产风险。
在研究频道,DayDayMap已更新30+网络空间测绘领域的高价值学术论文,这些论文凝聚了行业专家的智慧结晶,涵盖了前沿技术趋势、应用场景探索以及实战案例分析等丰富内容,为用户提供了宝贵的知识资源,帮助我们深入了解行业动态,提升专业素养。无论是企业用户、科研团队还是安全领域研究人员,都能在DayDayMap找到满足自身需求的优质资源,共同推动网络空间测绘技术的发展与进步。
即刻体验,开启高效检索之旅
还在等什么?快来体验DayDayMap平台的AI新功能吧!
https://www.daydaymap.com/AI
无门槛开放给平台所有用户,让我们一起携手共进,共同探索网络空间资产应用的无限可能!
史上最大规模的数据泄露:160 亿条登录凭证被曝光
News alert: Halo Security’s attack surface management platform wins MSP Today’s top award
Miami, June 18, 2025, CyberNewswire — Halo Security today announced that its attack surface management solution has been named a 2025 MSP Today Product of the Year Award winner by TMC, a leading global media company recognized for building communities … (more…)
The post News alert: Halo Security’s attack surface management platform wins MSP Today’s top award first appeared on The Last Watchdog.
The post News alert: Halo Security’s attack surface management platform wins MSP Today’s top award appeared first on Security Boulevard.
【HW备战特惠】你的HW防线够牢固吗?
618限时专享,HW备战福利
CACTER反钓鱼演练费用直降50%再减500
加赠7天免费试用
HW前夕!钓鱼邮件正悄悄以这些身份潜入企业!
“HW攻防指挥部通知”
“系统漏洞紧急补丁”
“人力资源安全考核”...
下单一键开通,极速开启反钓鱼实战演练
·预置100+高仿真攻击模板
·生成岗位风险热力图
·专业的分析报告
·重点人员安全意识培训
高仿真演练就是最好的实战防御
即刻开启企业安全检测
扫码立享5折、免费测评
最新研究发现:超半数垃圾邮件出自 AI 之手
GitHub 恶意模组渗透《我的世界》,超 1500 名玩家中招
AI教父辛顿最新访谈:在个性化算法时代,人类的共同体验消失了,数字智能必然超越生物智能,但20%的灭绝概率正被忽视
伊朗主动限网反制以色列攻击,地区冲突升级引爆网络战!
从Sleep Mask到Beacon Gate看现代EDR规避技术
.NET 基于 MachineKey 一键维持权限,反序列化工具实现RCE
.NET 安全攻防知识交流社区
RedTeam 整合术:ILMerge 助力 .NET 工具集打包
Endpoint adoption of Encrypted DNS
In a world where we have security options (this is 2025, after all), and yet we don’t bother accessing them, it’s like having vegetables and protein at the buffet but all we eat is the desert. No wonder we’re not doing as well as we could be doing! So, we think it’s time to check on our buffet of healthy options available when it comes to DNS encryption.
Last-mile DNS Encryption and how we got hereThis has been a long time coming. Many critical protocols have started out as a sketch on the back of a napkin, only to be adopted for their simplicity and immediate functionality. At some point later on, the protocol is then optimized and only after it is abused, does it finally get secured. Not surprisingly, that is the story with last-mile DNS encryption as well. It is such a broad attack vector that it’s time to address this weakness.
Encrypted DNS Server supportThe DNS is the ultimate client-server application environment. Naturally, the server must offer support before client endpoints could make use of it. All things considered, server-side adoption has occurred over the past few years at a decent pace to the point where most DNS server products, including public resolvers, support DoH and DoT standards.
Endpoint OS supportIt goes without saying that it will take some time before we reach critical mass on endpoint DNS encryption adoption simply because the lifecycle of endpoints can be measured in months, years or even decades. The effort in this blog article is to see where we are with the largest market share of endpoint operating systems, running the latest version of iOS, Android and Windows. Here is the TL;DR:
iOS 18.5 Android 15 Windows 11 (OS Build 27871) DDR Verified only (no support for opportunistic discovery) No support No support DNR DHCP Encrypted DNS Option No support No support Yes* Proprietary Upgrade n/a Yes** n/a*This isn’t a default feature yet, but requires a registry entry, see below
**Android just attempts to use DNS-over-TLS immediately upon receiving a DHCP-assigned DNS option (6).
Our effort essentially is to use the latest available Operating System on our core product offering with DDR opportunistic support as well as DNR:
Setup with adam:ONE- Dashboard → Manage Network → Advanced → Encryption → Enable internal DNS encryption
- Validate the DoH and DoT offers with a standard DDR query:
- DNS setup via Kea DHCP Server with the following custom JSON configuration on this LAN segment:
Windows 11 requires an administrator cmd regedit like this, thanks to this blog article for the hints:
reg add HKLM\SYSTEM\CurrentControlSet\Services\Dnscache\Parameters /v EnableDnr /t REG_DWORD /d 1Upon restart, the very first query came via DoH as the server-side log shows with [DoH] for each entry that came in over DoH:
I 18/6 12:59:07.625203 40107 DNS? 192.168.1.102@49670 TCP4 www.msftconnecttest.com A | [DoH] I 18/6 12:59:08.797999 40107 DNS? 192.168.1.102@49676 TCP4 mobile.events.data.microsoft.com A | [DoH] I 18/6 12:59:08.801119 40107 DNS? 192.168.1.102@49676 TCP4 client.wns.windows.com A | [DoH] I 18/6 12:59:09.909035 40107 DNS? 192.168.1.102@49676 TCP4 -keyid-46027e9f5683eff2b6745379a63b00ab0b637d10.microsoftaik.azure.net A | [DoH] I 18/6 12:59:11.367439 40107 DNS? 192.168.1.102@49676 TCP4 login.live.com A | [DoH] I 18/6 12:59:11.380371 40107 DNS? 192.168.1.102@56568 UDP4 config.edge.skype.com A | [DNS] I 18/6 12:59:11.380563 40107 DNS? 192.168.1.102@60653 UDP4 config.edge.skype.com HTTPS | [DNS] I 18/6 12:59:11.522564 40107 DNS? 192.168.1.102@49676 TCP4 officeclient.microsoft.com A | [DoH] I 18/6 12:59:11.795422 40107 DNS? 192.168.1.102@49676 TCP4 fd.api.iris.microsoft.com A | [DoH] I 18/6 12:59:11.819713 40107 DNS? 192.168.1.102@49676 TCP4 www.msn.com A | [DoH] I 18/6 12:59:11.830938 40107 DNS? 192.168.1.102@49676 TCP4 odc.officeapps.live.com A | [DoH] I 18/6 12:59:11.992085 40107 DNS? 192.168.1.102@49676 TCP4 ocsp.digicert.com A | [DoH] I 18/6 12:59:12.044973 40107 DNS? 192.168.1.102@49676 TCP4 -keyid-46027e9f5683eff2b6745379a63b00ab0b637d10.microsoftaik.azure.net A | [DoH] I 18/6 12:59:12.095170 40107 DNS? 192.168.1.102@49676 TCP4 arc.msn.com A | [DoH] I 18/6 12:59:12.236387 40107 DNS? 192.168.1.102@49676 TCP4 v20.events.data.microsoft.com A | [DoH] I 18/6 12:59:12.357970 40107 DNS? 192.168.1.102@49676 TCP4 sdx.microsoft.com A | [DoH] I 18/6 12:59:12.361815 40107 DNS? 192.168.1.102@49676 TCP4 assets.msn.com A | [DoH] I 18/6 12:59:12.466024 40107 DNS? 192.168.1.102@49676 TCP4 nav.smartscreen.microsoft.com A | [DoH] I 18/6 12:59:12.721586 40107 DNS? 192.168.1.102@49676 TCP4 data-edge.smartscreen.microsoft.com A | [DoH] I 18/6 12:59:13.499324 40107 DNS? 192.168.1.102@49676 TCP4 web.vortex.data.microsoft.com A | [DoH] I 18/6 12:59:13.552460 40107 DNS? 192.168.1.102@49676 TCP4 oloobe.officeapps.live.com A | [DoH] I 18/6 12:59:14.030990 40107 DNS? 192.168.1.102@49676 TCP4 cdnjs.cloudflare.com A | [DoH] I 18/6 12:59:14.034126 40107 DNS? 192.168.1.102@49676 TCP4 content.lifecycle.office.net A | [DoH] I 18/6 12:59:14.183873 40107 DNS? 192.168.1.102@49676 TCP4 c.pki.goog A | [DoH] I 18/6 12:59:14.899057 40107 DNS? 192.168.1.102@49676 TCP4 browser.pipe.aria.microsoft.com A | [DoH] I 18/6 12:59:15.060458 40107 DNS? 192.168.1.102@60416 UDP4 www.bing.com A | [DNS] I 18/6 12:59:15.060655 40107 DNS? 192.168.1.102@59254 UDP4 www.bing.com HTTPS | [DNS] I 18/6 12:59:15.068097 40107 DNS? 192.168.1.102@49676 TCP4 www.bing.com A | [DoH] I 18/6 12:59:15.068793 40107 DNS? 192.168.1.102@50578 UDP4 www.bing.com A | [DNS] I 18/6 12:59:15.068888 40107 DNS? 192.168.1.102@50410 UDP4 www.bing.com HTTPS | [DNS] I 18/6 12:59:15.080342 40107 DNS? 192.168.1.102@49676 TCP4 www.bing.com A | [DoH] I 18/6 12:59:15.081047 40107 DNS? 192.168.1.102@64168 UDP4 www.bing.com A | [DNS] I 18/6 12:59:15.081146 40107 DNS? 192.168.1.102@57723 UDP4 www.bing.com HTTPS | [DNS] I 18/6 12:59:15.096385 40107 DNS? 192.168.1.102@49676 TCP4 www.bing.com A | [DoH] I 18/6 12:59:15.402697 40107 DNS? 192.168.1.102@61377 UDP4 searchapp.bundleassets.example A | [DNS] I 18/6 12:59:15.402845 40107 DNS? 192.168.1.102@52294 UDP4 searchapp.bundleassets.example HTTPS | [DNS] I 18/6 12:59:15.406621 40107 DNS? 192.168.1.102@62267 UDP4 searchapp.bundleassets.example HTTPS | [DNS] I 18/6 12:59:15.406720 40107 DNS? 192.168.1.102@54613 UDP4 searchapp.bundleassets.example A | [DNS] I 18/6 12:59:15.410512 40107 DNS? 192.168.1.102@49676 TCP4 searchapp.bundleassets.example A | [DoH] I 18/6 12:59:15.935672 40107 DNS? 192.168.1.102@53280 UDP4 www.bing.com A | [DNS] I 18/6 12:59:15.935940 40107 DNS? 192.168.1.102@57009 UDP4 www.bing.com HTTPS | [DNS] I 18/6 12:59:15.953100 40107 DNS? 192.168.1.102@49676 TCP4 www.bing.com A | [DoH] I 18/6 12:59:15.953972 40107 DNS? 192.168.1.102@51615 UDP4 www.bing.com A | [DNS] I 18/6 12:59:15.954168 40107 DNS? 192.168.1.102@56535 UDP4 www.bing.com HTTPS | [DNS] I 18/6 12:59:15.969144 40107 DNS? 192.168.1.102@49676 TCP4 www.bing.com A | [DoH] I 18/6 12:59:16.235461 40107 DNS? 192.168.1.102@63650 UDP4 www.bing.com A | [DNS] I 18/6 12:59:16.235671 40107 DNS? 192.168.1.102@52874 UDP4 www.bing.com HTTPS | [DNS] I 18/6 12:59:16.256281 40107 DNS? 192.168.1.102@49676 TCP4 www.bing.com A | [DoH] I 18/6 12:59:16.257040 40107 DNS? 192.168.1.102@51858 UDP4 www.bing.com A | [DNS] I 18/6 12:59:16.257160 40107 DNS? 192.168.1.102@62638 UDP4 www.bing.com HTTPS | [DNS] I 18/6 12:59:16.272239 40107 DNS? 192.168.1.102@49676 TCP4 www.bing.com A | [DoH] I 18/6 12:59:17.186769 40107 DNS? 192.168.1.102@49676 TCP4 nf.smartscreen.microsoft.com A | [DoH] I 18/6 12:59:18.459635 40107 DNS? 192.168.1.102@49676 TCP4 th.bing.com A | [DoH] I 18/6 12:59:18.459869 40107 DNS? 192.168.1.102@49676 TCP4 img-s-msn-com.akamaized.net A | [DoH] I 18/6 12:59:18.460063 40107 DNS? 192.168.1.102@49676 TCP4 assets.msn.com A | [DoH] I 18/6 12:59:18.645218 40107 DNS? 192.168.1.102@49676 TCP4 ocsp.digicert.com A | [DoH] I 18/6 12:59:20.938553 40107 DNS? 192.168.1.102@64062 UDP4 www.bing.com A | [DNS] I 18/6 12:59:20.938723 40107 DNS? 192.168.1.102@52576 UDP4 www.bing.com HTTPS | [DNS] I 18/6 12:59:20.952151 40107 DNS? 192.168.1.102@49676 TCP4 www.bing.com A | [DoH] I 18/6 12:59:20.952799 40107 DNS? 192.168.1.102@57697 UDP4 www.bing.com A | [DNS] I 18/6 12:59:20.952897 40107 DNS? 192.168.1.102@49593 UDP4 www.bing.com HTTPS | [DNS] I 18/6 12:59:20.967727 40107 DNS? 192.168.1.102@49676 TCP4 www.bing.com A | [DoH] I 18/6 12:59:21.534849 40107 DNS? 192.168.1.102@49676 TCP4 self.events.data.microsoft.com A | [DoH] I 18/6 12:59:25.949726 40107 DNS? 192.168.1.102@55461 UDP4 www.bing.com A | [DNS] Interesting observations of DNS queries coming from Windows when DNR is enabled- The very first connectivity test is over DoH
- Many other queries still use legacy DNS (labeled as [DNS] at the end of each query
Our Android test device is a Samsung Knox phone with the latest update including Android 15. It completely ignores the DNR option, never makes a DDR query but immediately assumes DoT availability on DHCP Option 6 as can be seen in the queries for the first number of seconds on bootup:
I 18/6 12:45:04.130833 40107 DNS? 192.168.1.104@34412 TCP4 yhqakv-dnsotls-ds.metric.gstatic.com AAAA | [DoT] I 18/6 12:45:04.170452 40107 DNS? 192.168.1.104@23171 UDP4 www.google.com A | [DNS] I 18/6 12:45:04.177893 40107 DNS? 192.168.1.104@23171 UDP4 www.google.com A | [DNS] I 18/6 12:45:04.177948 40107 DNS? 192.168.1.104@34412 TCP4 yhqakv-dnsotls-ds.metric.gstatic.com AAAA | [DoT] I 18/6 12:45:04.181311 40107 DNS? 192.168.1.104@45450 UDP4 yhqakv-dnsotls-ds.metric.gstatic.com AAAA | [DNS] I 18/6 12:45:04.192875 40107 DNS? 192.168.1.104@19031 UDP4 connectivitycheck.gstatic.com A | [DNS] I 18/6 12:45:04.200337 40107 DNS? 192.168.1.104@19031 UDP4 connectivitycheck.gstatic.com A | [DNS] I 18/6 12:45:04.209486 40107 DNS? 192.168.1.104@1924 UDP4 www.google.com A | [DNS] I 18/6 12:45:04.212849 40107 DNS? 192.168.1.104@1924 UDP4 www.google.com A | [DNS] I 18/6 12:45:04.259635 40107 DNS? 192.168.1.104@62826 UDP4 time.android.com A | [DNS] I 18/6 12:45:04.262401 40107 DNS? 192.168.1.104@62826 UDP4 time.android.com A | [DNS] I 18/6 12:45:04.376422 40107 DNS? 192.168.1.104@11264 UDP4 north-america.pool.ntp.org A | [DNS] I 18/6 12:45:04.385530 40107 DNS? 192.168.1.104@11264 UDP4 north-america.pool.ntp.org A | [DNS] I 18/6 12:45:04.396185 40107 DNS? 192.168.1.104@34420 TCP4 scs-use2.bixbyllm.com A | [DoT] I 18/6 12:45:04.411160 40107 DNS? 192.168.1.104@24572 UDP4 2.android.pool.ntp.org A | [DNS] I 18/6 12:45:04.413913 40107 DNS? 192.168.1.104@24572 UDP4 2.android.pool.ntp.org A | [DNS] I 18/6 12:45:04.573249 40107 DNS? 192.168.1.104@44869 UDP4 connectivitycheck.gstatic.com A | [DNS] I 18/6 12:45:04.603191 40107 DNS? 192.168.1.104@34420 TCP4 qcc.qualcomm.com A | [DoT] I 18/6 12:45:04.699213 40107 DNS? 192.168.1.104@34420 TCP4 mtalk.google.com A | [DoT] I 18/6 12:45:05.892239 40107 DNS? 192.168.1.104@41745 UDP4 connectivitycheck.gstatic.com AAAA | [DNS] I 18/6 12:45:05.892538 40107 DNS? 192.168.1.104@39507 UDP4 www.google.com AAAA | [DNS] I 18/6 12:45:05.892656 40107 DNS? 192.168.1.104@13190 UDP4 www.google.com A | [DNS] I 18/6 12:45:06.226486 40107 DNS? 192.168.1.104@34420 TCP4 app-measurement.com A | [DoT] I 18/6 12:45:06.287595 40107 DNS? 192.168.1.104@34420 TCP4 www.googleapis.com A | [DoT] I 18/6 12:45:06.797100 40107 DNS? 192.168.1.104@34420 TCP4 api.account.samsung.com A | [DoT] I 18/6 12:45:06.813581 40107 DNS? 192.168.1.104@34420 TCP4 2.android.pool.ntp.org A | [DoT] I 18/6 12:45:06.884893 40107 DNS? 192.168.1.104@34420 TCP4 roughtime.int08h.com A | [DoT] I 18/6 12:45:07.123092 40107 DNS? 192.168.1.104@34420 TCP4 scs-use2.bixbyllm.com A | [DoT] I 18/6 12:45:07.832489 40107 DNS? 192.168.1.104@34420 TCP4 us-auth2.samsungosp.com A | [DoT] I 18/6 12:45:08.070911 40107 DNS? 192.168.1.104@34420 TCP4 voilatile-pa.googleapis.com A | [DoT] I 18/6 12:45:08.472463 40107 DNS? 192.168.1.104@34420 TCP4 www.samsung.com A | [DoT] I 18/6 12:45:08.527292 40107 DNS? 192.168.1.104@34420 TCP4 play.samsungcloud.com A | [DoT] I 18/6 12:45:08.563534 40107 DNS? 192.168.1.104@55956 UDP4 www.google.com A | [DNS] I 18/6 12:45:08.574401 40107 DNS? 192.168.1.104@34420 TCP4 remoteprovisioning.googleapis.com A | [DoT] I 18/6 12:45:08.628146 40107 DNS? 192.168.1.104@34420 TCP4 pinning-02.secb2b.com A | [DoT] I 18/6 12:45:08.680158 40107 DNS? 192.168.1.104@34420 TCP4 gmscompliance-pa.googleapis.com A | [DoT] I 18/6 12:45:08.813855 40107 DNS? 192.168.1.104@34420 TCP4 connectivitycheck.gstatic.com A | [DoT] I 18/6 12:45:08.816766 40107 DNS? 192.168.1.104@34420 TCP4 www.tizen.org A | [DoT] I 18/6 12:45:09.019037 40107 DNS? 192.168.1.104@34420 TCP4 vas.samsungapps.com A | [DoT] I 18/6 12:45:09.047106 40107 DNS? 192.168.1.104@34420 TCP4 firebaseremoteconfig.googleapis.com A | [DoT] I 18/6 12:45:09.050303 40107 DNS? 192.168.1.104@36682 UDP4 www.google.com A | [DNS] I 18/6 12:45:09.119191 40107 DNS? 192.168.1.104@50465 UDP4 216.58.202.4.in-addr.arpa PTR | [DNS] I 18/6 12:45:09.121136 40107 DNS? 192.168.1.104@55885 UDP4 *google.com A | [DNS] I 18/6 12:45:09.127663 40107 DNS? 192.168.1.104@37673 UDP4 www.goooooooooooooooooooooooooooooooooooooooooooooooooooooooooogle.com A | [DNS] I 18/6 12:45:09.130458 40107 DNS? 192.168.1.104@44701 UDP4 GOOGLE.COM A | [DNS] I 18/6 12:45:09.130650 40107 DNS? 192.168.1.104@44705 UDP4 google.com A | [DNS] I 18/6 12:45:09.135176 40107 DNS? 192.168.1.104@36207 UDP4 google.com A | [DNS] I 18/6 12:45:09.137538 40107 DNS? 192.168.1.104@38163 UDP4 google.com A | [DNS] I 18/6 12:45:09.153497 40107 DNS? 192.168.1.104@34420 TCP4 www.craigslist.org A | [DoT] I 18/6 12:45:09.158082 40107 DNS? 192.168.1.104@56577 UDP4 google.com A | [DNS] I 18/6 12:45:09.173495 40107 DNS? 192.168.1.104@47085 UDP4 google.com A | [DNS] I 18/6 12:45:09.277263 40107 DNS? 192.168.1.104@37715 UDP4 google.com.onion A | [DNS] I 18/6 12:45:09.302229 40107 DNS? 192.168.1.104@33692 UDP4 google.com NS | [DNS] I 18/6 12:45:09.307605 40107 DNS? 192.168.1.104@49151 UDP4 google.com A | [DNS] I 18/6 12:45:09.316919 40107 DNS? 192.168.1.104@34420 TCP4 gsl.samsunggsl.com A | [DoT] I 18/6 12:45:09.330382 40107 DNS? 192.168.1.104@43499 UDP4 google.com CNAME | [DNS] I 18/6 12:45:09.341423 40107 DNS? 192.168.1.104@47015 UDP4 google.com SOA | [DNS] I 18/6 12:45:09.343975 40107 DNS? 192.168.1.104@48022 UDP4 216.58.202.4.in-addr.arpa PTR | [DNS] I 18/6 12:45:09.353547 40107 DNS? 192.168.1.104@41133 UDP4 google.com 13 | [DNS] I 18/6 12:45:09.402174 40107 DNS? 192.168.1.104@60555 UDP4 google.com WKS | [DNS] I 18/6 12:45:09.515895 40107 DNS? 192.168.1.104@52889 UDP4 google.com A | [DNS] I 18/6 12:45:09.766511 40107 DNS? 192.168.1.104@34420 TCP4 time.google.com A | [DoT] I 18/6 12:45:09.798048 40107 DNS? 192.168.1.104@34420 TCP4 clienttracing-pa.googleapis.com A | [DoT] I 18/6 12:45:09.798405 40107 DNS? 192.168.1.104@34420 TCP4 www.google.com A | [DoT] I 18/6 12:45:09.806167 40107 DNS? 192.168.1.104@34420 TCP4 discover-pa.googleapis.com A | [DoT] I 18/6 12:45:09.914599 40107 DNS? 192.168.1.104@34420 TCP4 es11.samsung-sm-ds.com A | [DoT] I 18/6 12:45:10.090984 40107 DNS? 192.168.1.104@34420 TCP4 roughtime.cloudflare.com A | [DoT] I 18/6 12:45:10.402509 40107 DNS? 192.168.1.104@34420 TCP4 safebrowsing.googleapis.com A | [DoT] I 18/6 12:45:10.416315 40107 DNS? 192.168.1.104@34420 TCP4 policy.samsungcloud.com A | [DoT] I 18/6 12:45:10.466249 40107 DNS? 192.168.1.104@34420 TCP4 time.xtracloud.net A | [DoT] I 18/6 12:45:10.783074 40107 DNS? 192.168.1.104@34420 TCP4 capi.samsungcloud.com A | [DoT] I 18/6 12:45:11.148622 40107 DNS? 192.168.1.104@34420 TCP4 lpa.live.esimdiscovery.com A | [DoT] I 18/6 12:45:11.152048 40107 DNS? 192.168.1.104@34420 TCP4 us-gslu.samsunggsl.com A | [DoT] I 18/6 12:45:11.402690 40107 DNS? 192.168.1.104@34420 TCP4 encrypted-tbn3.gstatic.com A | [DoT] I 18/6 12:45:11.407567 40107 DNS? 192.168.1.104@34420 TCP4 ssl.gstatic.com A | [DoT] I 18/6 12:45:11.407745 40107 DNS? 192.168.1.104@34420 TCP4 www.gstatic.com A | [DoT] I 18/6 12:45:11.407897 40107 DNS? 192.168.1.104@34420 TCP4 encrypted-tbn0.gstatic.com A | [DoT] I 18/6 12:45:11.489656 40107 DNS? 192.168.1.104@34420 TCP4 clients2.google.com A | [DoT] I 18/6 12:45:11.641547 40107 DNS? 192.168.1.104@34420 TCP4 dvs.samsungmobile.com A | [DoT] I 18/6 12:45:11.699535 40107 DNS? 192.168.1.104@34420 TCP4 accounts.google.com A | [DoT] I 18/6 12:45:11.886269 40107 DNS? 192.168.1.104@34420 TCP4 sdk.pushmessage.samsung.com A | [DoT] I 18/6 12:45:12.151010 40107 DNS? 192.168.1.104@38163 UDP4 google.com A | [DNS] I 18/6 12:45:12.358996 40107 DNS? 192.168.1.104@34420 TCP4 encrypted-tbn2.gstatic.com A | [DoT] I 18/6 12:45:12.362051 40107 DNS? 192.168.1.104@34420 TCP4 geller-pa.googleapis.com A | [DoT] I 18/6 12:45:12.402978 40107 DNS? 192.168.1.104@60555 UDP4 google.com WKS | [DNS] I 18/6 12:45:12.446012 40107 DNS? 192.168.1.104@34420 TCP4 notifications-ueeshp-pa.googleapis.com A | [DoT] I 18/6 12:45:12.688201 40107 DNS? 192.168.1.104@34420 TCP4 ers.samsungcloud.com A | [DoT] I 18/6 12:45:12.790038 40107 DNS? 192.168.1.104@34420 TCP4 android.clients.google.com A | [DoT] I 18/6 12:45:12.859099 40107 DNS? 192.168.1.104@34420 TCP4 notifications-pa.googleapis.com A | [DoT] I 18/6 12:45:13.022836 40107 DNS? 192.168.1.104@34420 TCP4 play-fe.googleapis.com A | [DoT] I 18/6 12:45:13.081098 40107 DNS? 192.168.1.104@34420 TCP4 path2.xtracloud.net A | [DoT] I 18/6 12:45:13.279382 40107 DNS? 192.168.1.104@34420 TCP4 play.googleapis.com A | [DoT] I 18/6 12:45:13.507234 40107 DNS? 192.168.1.104@34420 TCP4 playstoregatewayadapter-pa.googleapis.com A | [DoT] I 18/6 12:45:13.747891 40107 DNS? 192.168.1.104@34420 TCP4 prod-lt-playstoregatewayadapter-pa.googleapis.com A | [DoT] I 18/6 12:45:13.986409 40107 DNS? 192.168.1.104@34420 TCP4 play-lh.googleusercontent.com A | [DoT] I 18/6 12:45:14.227720 40107 DNS? 192.168.1.104@34420 TCP4 i.ytimg.com A | [DoT] I 18/6 12:45:14.333421 40107 DNS? 192.168.1.104@34420 TCP4 api.weather.com A | [DoT] I 18/6 12:45:14.736183 40107 DNS? 192.168.1.104@34420 TCP4 oneclient.sfx.ms A | [DoT] I 18/6 12:45:14.761383 40107 DNS? 192.168.1.104@34420 TCP4 dcg.microsoft.com A | [DoT] I 18/6 12:45:14.902781 40107 DNS? 192.168.1.104@34420 TCP4 default.exp-tas.com A | [DoT] I 18/6 12:45:15.172440 40107 DNS? 192.168.1.104@34420 TCP4 ca-odc.samsungapps.com A | [DoT] I 18/6 12:45:15.374939 40107 DNS? 192.168.1.104@34420 TCP4 roughtime.sandbox.google.com A | [DoT] I 18/6 12:45:15.689301 40107 DNS? 192.168.1.104@34420 TCP4 storage.googleapis.com A | [DoT] I 18/6 12:45:15.733188 40107 DNS? 192.168.1.104@34420 TCP4 update.googleapis.com A | [DoT] I 18/6 12:45:16.031011 40107 DNS? 192.168.1.104@34420 TCP4 m.media-amazon.com A | [DoT] I 18/6 12:45:16.673755 40107 DNS? 192.168.1.104@34420 TCP4 mobile.events.data.microsoft.com A | [DoT] I 18/6 12:45:16.676291 40107 DNS? 192.168.1.104@34420 TCP4 scs-config-use2.bixbyllm.com A | [DoT] I 18/6 12:45:17.503677 40107 DNS? 192.168.1.104@34420 TCP4 in.appcenter.ms A | [DoT] Interesting observations on Android (as least on this Samsung device):- The very first query came in over [DoT] but similar to Windows, there are queries that are not encrypted
- An invalid query is always made on startups for *google.com
- Another invalid query is always made for www.goooooooooooooooooooooooooooooooooooooooooooooooooooooooooogle.com (which, incidentally is not managed by MarkMonitor as many most Google TLD registrations are, and I know I’m far from the first one to observe this)
iOS 18.5 on any modern phone produces the same result… not the first query but always the second query executes DDR, but ignored as it does not support the opportunistic feature:
I 18/6 12:52:42.703787 40107 DNS? 192.168.1.105@64126 UDP4 46-courier.push.apple.com A | [DNS] I 18/6 12:52:42.714170 40107 DNS? 192.168.1.105@54042 UDP4 _dns.resolver.arpa SVCB | [DNS] I 18/6 12:52:42.718757 40107 DNS? 192.168.1.105@54086 UDP4 280test-xkboiopjp0.2my.network HTTPS | [DNS] I 18/6 12:52:42.719385 40107 DNS? 192.168.1.105@49239 UDP4 280test-xkboiopjp0.2my.network A | [DNS] I 18/6 12:52:42.734130 40107 DNS? 192.168.1.105@65534 UDP4 gsp85-ssl.ls.apple.com HTTPS | [DNS] I 18/6 12:52:42.734293 40107 DNS? 192.168.1.105@57310 UDP4 gsp85-ssl.ls.apple.com A | [DNS] I 18/6 12:52:42.879236 40107 DNS? 192.168.1.105@57260 UDP4 configuration.ls.apple.com A | [DNS] I 18/6 12:52:42.879607 40107 DNS? 192.168.1.105@64697 UDP4 configuration.ls.apple.com HTTPS | [DNS] I 18/6 12:52:42.882839 40107 DNS? 192.168.1.105@56279 UDP4 gsp85-ssl.ls2-apple.com.akadns.net HTTPS | [DNS] I 18/6 12:52:42.883351 40107 DNS? 192.168.1.105@56222 UDP4 gsp85-ssl.ls2-apple.com.akadns.net A | [DNS] I 18/6 12:52:43.055124 40107 DNS? 192.168.1.105@52498 UDP4 mask.icloud.com HTTPS | [DNS] I 18/6 12:52:43.055247 40107 DNS? 192.168.1.105@49906 UDP4 mask.icloud.com A | [DNS] I 18/6 12:52:43.059336 40107 DNS? 192.168.1.105@51823 UDP4 configuration.ls.v.aaplimg.com HTTPS | [DNS] I 18/6 12:52:43.061545 40107 DNS? 192.168.1.105@50558 UDP4 mask-h2.icloud.com HTTPS | [DNS] I 18/6 12:52:43.061599 40107 DNS? 192.168.1.105@51986 UDP4 mask-h2.icloud.com A | [DNS] I 18/6 12:52:43.088667 40107 DNS? 192.168.1.105@58320 UDP4 configuration.ls.v.aaplimg.com A | [DNS] I 18/6 12:52:43.766236 40107 DNS? 192.168.1.105@51121 UDP4 gsp-ssl.ls.apple.com HTTPS | [DNS] I 18/6 12:52:43.766335 40107 DNS? 192.168.1.105@63807 UDP4 gsp-ssl.ls.apple.com A | [DNS] I 18/6 12:52:43.766357 40107 DNS? 192.168.1.105@60702 UDP4 _dns.resolver.arpa SVCB | [DNS] I 18/6 12:52:45.340823 40107 DNS? 192.168.1.105@53379 UDP4 captive.apple.com HTTPS | [DNS] I 18/6 12:52:45.341879 40107 DNS? 192.168.1.105@54459 UDP4 captive.apple.com A | [DNS] I 18/6 12:52:47.741795 40107 DNS? 192.168.1.105@51371 UDP4 gspe1-ssl.ls.apple.com HTTPS | [DNS] I 18/6 12:52:47.741901 40107 DNS? 192.168.1.105@51999 UDP4 gspe1-ssl.ls.apple.com A | [DNS] I 18/6 12:52:47.973044 40107 DNS? 192.168.1.105@64647 UDP4 captive.apple.com HTTPS | [DNS] I 18/6 12:52:47.973906 40107 DNS? 192.168.1.105@55777 UDP4 captive.apple.com A | [DNS] I 18/6 12:52:47.973942 40107 DNS? 192.168.1.105@57512 UDP4 gateway.icloud.com HTTPS | [DNS] I 18/6 12:52:47.975315 40107 DNS? 192.168.1.105@49851 UDP4 gateway.icloud.com A | [DNS] Observations on iOS:- As stated above, DDR opportunistic mode is not supported, so iOS just stays on legacy Do53, cleartext, unencrypted
While other OS options such as vanilla Android, Chromebooks, Linux distributions, etc, are in use, I limited the report to what is represents 95% of the market usage today. Having said that, with my very simple one-shot test with the latest Ubuntu 24.04, I noticed it does not made a DDR request at all and ignores DNR, and makes not upgrade attempt unless I first added this to /etc/systemd/resolved.conf:
DNSOverTLS=opportunisticAs for DNR, it completely ignored the DHCP offer when using the same config as what Windows accepted above.
A note about Mobile Device ManagementThe three giant OS platforms all have MDM-enabled option for DoH:
- Windows with Intune/ZTDNS
- Samsung via Knox
- iOS with Enterprise apps enforcing a DoH URL for all DNS
The application of the above is only sometimes practical, hence a more local network or endpoint-centric option is necessary.
Call to action - we want our cake and eat it tooWouldn’t it be nice if we made it easy for the MSP and sysadmins of the world to just make DNS be as secure as possible, starting with today’s heterogeneous environment and simply start by supporting DDR opportunistically when DNR or MDM-pushed options aren’t available? Keep in mind that rfc1918 is still the most common network IP deployment in SMB and SME and even Corporate networks. Furthermore in many organizations, the DHCP team is separate and distinct from the DNS team. Let’s give them both a chance and reduce the friction to adopting better security.
1 post - 1 participant
The post Endpoint adoption of Encrypted DNS appeared first on Security Boulevard.