Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[New Rule] Potential WPAD Spoofing via DNS Record Creation #3748

Merged
merged 3 commits into from
Jun 20, 2024
Merged

Conversation

w0rk3r
Copy link
Contributor

@w0rk3r w0rk3r commented Jun 3, 2024

Issues

Related to #3544 & #3005

Summary

Identifies the creation of a DNS record that is potentially meant to enable WPAD spoofing. Attackers can disable the Global Query Block List (GQBL) and create a "wpad" record to exploit hosts running WPAD with default settings for privilege escalation and lateral movement.

Copy link
Contributor

@terrancedejesus terrancedejesus left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nice rule!

@w0rk3r w0rk3r merged commit 3fd9bae into main Jun 20, 2024
9 checks passed
@w0rk3r w0rk3r deleted the wpad_record branch June 20, 2024 12:34
protectionsmachine pushed a commit that referenced this pull request Jun 20, 2024
protectionsmachine pushed a commit that referenced this pull request Jun 20, 2024
protectionsmachine pushed a commit that referenced this pull request Jun 20, 2024
protectionsmachine pushed a commit that referenced this pull request Jun 20, 2024
protectionsmachine pushed a commit that referenced this pull request Jun 20, 2024
protectionsmachine pushed a commit that referenced this pull request Jun 20, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport: auto Domain: Endpoint OS: Windows windows related rules Rule: New Proposal for new rule
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants