Closed Axylos closed 1 year ago
Hi @Axylos. This looks really interesting. I'm assuming this is the repo: https://github.com/Axylos/bitter_domain.
I would like to see a talk about this. How close are you to being able to present? About how long do you expect the talk to run?
Whoohoo! I'm really excited to share what I've got.
I could work on things over the weekend and be ready by as early as next week. Regarding time, I'm a bit flexible, but I would like at least 30 min and would feel more comfortable with around 45 min.
OK, we've got availability for you this Wednesday if you're able to put something together quickly. Once you confirm we'll get the details up on NYC.rb and spread the word!
Awesome :)
This upcoming Wednesday works. Really looking forward to it! Thanks for the opportunity.
"Bitsquatting" refers to a strategy for DNS hijacking that leverages random bit errors that occur when setting or resolving domain names. The exploit is relatively simple to implement, but exploring its underlying motivations and possibility can help shed light on some of the basic components of the DNS system. I hope to describe the mechanics of bitsquatting, its potential mitigation, as well as lessons about the workings of DNS I've gained while hacking on this project in Ruby.
I wrote a gem as a small toolkit for learning about bitsquatting, consisting of a utility for generating valid domain names that are precisely 1-bit in difference from a domain given as input and a class that checks the availability of domains for the sake of defensively registering them. Ruby offered decent DNS libraries, and the built-in bit operations can smoothly be leveraged for the aforementioned tasks.
The talk will cover an overview of bitsquatting, the mechanics for generating candidate domains and verifying their availability, a description of how DNS queries must be handled in a non-standard fashion to effectively implement the exploit, and lastly my experiences writing my first gem.