It seems that #Josephbeeton found a #RCE in Togglz exposed on localhost via in-browser executed JS. Now, I’m not even close to an expert, but some of this looks a bit like @taviso’s #dnsrebinding attack type? #hacklu2025

One of the long-standing issues with the "Block outside intrusion into LAN" list is that it can not protect against DNS rebinding attacks.
This new feature allows one to create a rule blocking connections to domains which resolve to localhost or IPs on your LAN. Classes A, B, and C are supported.

https://github.com/gorhill/uBlock/commit/030d7334e4

#uBlockOrigin #BlockOutsiderIntrusionIntoLAN #DNSRebinding

Add support for `lan`/`loopback` values to `ipaddress=` option · gorhill/uBlock@030d733

Related issue: https://github.com/uBlockOrigin/uBlock-issues/issues/1070

GitHub
A Day in the Life of a Kenyan Goth - Think Africa Press

All dressed in black and adorned with piercings, a small but growing community of goths is one manifestation of the new cultures and subcultures emerging in Kenya. By Rowan Emslie Nairobi, Kenya: David Lith is a tattoo artist working out of Nakuru, the third largest urban centre in Kenya. On weekends he embarks on a […] More

Think Africa Press
Great update on DNS rebinding attacks by my colleague @sanktjodel including a primer on Local Network Access, and how to bypass it on Chrome https://research.nccgroup.com/2023/04/27/state-of-dns-rebinding-in-2023/ #dnsrebinding
State of DNS Rebinding in 2023

Different forms of DNS rebinding attacks have been described as far back as 1996 for Java Applets and 2002 for JavaScript (Quick-Swap). It has been four years since our State of DNS Rebinding prese…

NCC Group Research Blog
Finally got some time to play around on h1... Had to refresh my notes around some of the testing tools / infra and bumped into https://github.com/brannondorsey/whonow . I always forget I have a domain + instance for it. IMHO it is absolutely great to quickly test against #dnsrebinding for #ssrf . #bugbountytips
GitHub - brannondorsey/whonow: A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)

A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53) - GitHub - brannondorsey/whonow: A "malicious" DNS server ...

GitHub
Half a billion IoT devices inside of businesses can be hacked through decade-old DNS rebinding attacks https://boingboing.net/2018/07/24/decade-old-vulns.html #internetofshit #dnsrebinding #scholarship #Business #security #infosec #Video #iot
Half a billion IoT devices inside of businesses can be hacked through decade-old DNS rebinding attacks

Half a billion IoT devices inside of businesses can be hacked through decade-old DNS rebinding attacks

Boing Boing
Im Blizzard Update Agent klaffte eine Sicherheitslücke, über die Angreifer Schadcode auf Computer hätten ausführen können. Eine abgesicherte Version ist erschienen. https://www.heise.de/security/meldung/500-Millionen-Spieler-von-Blizzard-Computerspielen-waren-ueber-Luecke-angreifbar-3948706.html #BlizzardUpdateAgent #DNSRebinding #Schwachstelle #Sicherheitslücke
500 Millionen Spieler von Blizzard-Computerspielen waren über Lücke angreifbar

Im Blizzard Update Agent klaffte eine Sicherheitslücke, über die Angreifer Schadcode auf Computer hätten ausführen können. Eine abgesicherte Version ist erschienen.