Discover known DNS attacks and abuses
The DNS protocol is weak. Knowledge of its vulnerabilities must be shared
This website is under construction
The ability to quickly identify the attack surface is essential. Whether you are penetration testing or chasing bug bounties.
Network defenders benefit from passive reconnaissance in a number of ways. With analysis informing information security strategy.
Understanding network based OSINT helps information technologists to better operate, assess and manage the network.
Why this website
It is hard to find a documentation that centralize all issues with the DNS protocol. This is an effort to list differents abuses of the protocol, how they works and how we can protect when possible. This is an on going project and there’s room for amelioration, don’t hesitate to contact us if you think we should add something!