Open moerkey opened 3 years ago
Hi, I second the request/appeal from moerkey. I am using a pi-hole in my environment, as many other will also do, and that is also able to pull such a list. Thanks in advance, cheers.
could you provide the list with domain names only in another file?
curl -s 'https://raw.githubusercontent.com/guardicore/labs_campaigns/master/Autodiscover/autodiscover-tlds.txt' | awk '{print $2}'
That's how you get a list with domains only.
could you provide the list with domain names only in another file?
curl -s 'https://raw.githubusercontent.com/guardicore/labs_campaigns/master/Autodiscover/autodiscover-tlds.txt' | awk '{print $2}'
That's how you get a list with domains only.
I know but I need an external hosted source which I can query regularly. So changes should also go in the other file.
I know but I need an external hosted source which I can query regularly. So changes should also go in the other file.
Feel free to create another GitHub repository and fill its content via GitHub actions triggered when the original file changes.
Hi Team, Does the credential leak also affect for O365 domain tenants...? Also will this still affect if we have Modern Authentication in place at Org level on the tenant..?
when i add this alias to our firewall it detect it only as one ip 127.0.0.1. i am using opnsense. is it easy to add those to the host file of the exchange or AD ?
Hello,
Pi-hole can use the list in raw format. However, there's an issue with special characters; please refer to relevant issue #16.
Hello, could you provide the list with domain names only in another file? FortiGates are capable of fetching this data in Threat feets. With that I can create a firewall rules to block traffic to that. Thank you. Cheers