cybercdh Profile
cybercdh

@cybercdh

Followers
8K
Following
6K
Media
248
Statuses
2K

https://t.co/vPOGMsiRE7

Joined August 2015
Don't wanna be here? Send us removal request.
@cybercdh
cybercdh
17 days
Ready to automate your way to better recon?.
Tweet card summary image
github.com
tracr - DNS Tracer for Dangling Nameserver Detection - cybercdh/tracr
0
0
2
@cybercdh
cybercdh
17 days
7/ Total: Β£25,400 in nameserver takeover bounties.ROI: 22 hours development = Β£127/hour πŸ“ˆ.
1
0
1
@cybercdh
cybercdh
17 days
6/ The first time I ran tracr on a real target:. 4 minutes to process what would take Derek 6 hours.Clean output, clear vulnerabilities.Still had sanity left to explain to family why I was cackling. First vulnerable domain found: Β£3,200 πŸ’°.
1
0
1
@cybercdh
cybercdh
17 days
5/ Enter tracr πŸš€. What took 6 hours of manual digging now takes 4 minutes. assetfinder -subs-only | tracr -c 50. Concurrent DNS tracing + vulnerability detection = profit.
1
0
0
@cybercdh
cybercdh
17 days
4/ My eureka moment came somewhere around subdomain #247. "This repetitive nonsense is exactly what computers were invented for!". *Opens IDE at 3 AM while family sleeps*. Gerald the coffee mug: *remains supportive but silent*.
1
0
1
@cybercdh
cybercdh
17 days
3/ Meet Derek Traceman (not his real name). Derek finds nameserver takeovers the hard way:. - Copy subdomain to terminal.- Run dig +trace manually .- Squint at output for NS records.- Test each nameserver individually.- Repeat 2,846 more times.- Slowly lose will to live.
1
0
1
@cybercdh
cybercdh
17 days
2/ Picture this: You're manually running `dig +trace` on 2,847 subdomains, one by one, looking for dangling nameservers. Your eyes are bleeding. Your sanity is gone. There has to be a better way. Spoiler: There was.
1
0
1
@cybercdh
cybercdh
17 days
🧡 How I earned Β£25k in bug bounties by automating something I was doing manually at 2:47 AM. A thread about building tracr, dangling nameservers, and why my coffee mug Gerald is my most reliable debugging partner πŸ‘‡.
1
1
3
@cybercdh
cybercdh
18 days
πŸš€ Just released tracr - a fast DNS tracer for finding dangling nameserver vulnerabilities .βœ… Concurrent DNS tracing .βœ… Detects REFUSED/SERVFAIL responses .βœ… Pipes perfectly with subfinder/amass .βœ… Clean output for tool chaining .
Tweet card summary image
github.com
tracr - DNS Tracer for Dangling Nameserver Detection - cybercdh/tracr
3
0
3
@cybercdh
cybercdh
1 month
New blog post where I have some fun building Obsidian templates to support armchair investigations.
colin.bot
Featuring: desk lamp flickers, empty mugs, and the slow unraveling of one man’s sanity - powered by markdown.
0
2
9
@cybercdh
cybercdh
3 months
ChatGPT hitting me with home truths.
Tweet media one
0
0
1
@cybercdh
cybercdh
6 months
This looks to be the flight path of the military Sikorsky H-60 helicopter (PAT25/AE313D) as it collides with the passenger jet CRJ-700 (JIA5432/A97753) on its approach to DCA. Praying for those involved and wishing rescuers the strength they need.
1
2
5
@cybercdh
cybercdh
6 months
7/ Let me know if you've tried similar approaches or tools in your recon workflows! Always looking to improve these projects. Happy hunting! πŸ› οΈβœ¨.
0
0
2
@cybercdh
cybercdh
6 months
6/ These tools are designed to help researchers and security teams scale their efforts in securing DNS records and domains. DNS hygiene isn't just a best practice - it's a necessity in today's threat landscape.
1
0
1
@cybercdh
cybercdh
6 months
5/ 3. tldvariant:.Generate lists of domains with valid TLD's that could be typo'd variations of your own. πŸ›‘οΈ Great for spotting typo'd DNS records or proactively registering these domains to protect your brand. GitHub:
github.com
Contribute to cybercdh/tldvariant development by creating an account on GitHub.
1
0
1
@cybercdh
cybercdh
6 months
4/ 2. assetFinder (fork):.Find subdomains of a target domain, with extra sources added to enhance @TomNomNom's original. πŸ”— Use it to map attack surfaces and then inspect DNS records for misconfigurations with nsfckup. GitHub:
Tweet card summary image
github.com
Find domains and subdomains related to a given domain - cybercdh/assetfinder
1
0
2
@cybercdh
cybercdh
6 months
3/ 1. nsfckup:.Identifies NameServer takeover opportunities by analyzing NameServer domains that return NXDOMAIN responses. πŸ” Spot the issues before attackers do. GitHub:
github.com
Looks for NameServers which return an NXDOMAIN, which may indicate a NS Takeover opportunity. - cybercdh/nsfckup
1
0
0
@cybercdh
cybercdh
6 months
2/ As a security researcher, I've seen how DNS misconfigurations like this can create massive attack surfaces. To help others identify and prevent similar issues, I've built 2 open-source tools and forked another which you can use today to level up your DNS hygiene. πŸ§΅πŸ‘‡.
1
0
0