DomainTools https://www.domaintools.com/resources/tag/domaintools-101 Innovative, Practical Advice to Improve your Cybersecurity Posture en-US https://wordpress.org/?v=6.7.2 <![CDATA[ Carrying Arbitrary Data Payloads (Such as Images) In NMSG ]]> https://www.domaintools.com/resources/blog/carrying-arbitrary-data-payloads-such-as-images-in-nmsg/ Thu, 02 Mar 2023 16:51:07 +0000 54 DomainTools Research https://www.domaintools.com/?p=22547 Introduction If you work with SIE (the Security Information Exchange), you’ll have encountered NMSG-format files. NMSG is the format Farsight Security (now part of DomainTools) uses to distribute DNS cache miss traffic and other cybersecurity data over SIE’s jumbo frame-enabled Ethernet switches. NMSG payloads normally contain small observations, and in fact, we’re often able to […]

]]>
<![CDATA[ Using Iris Investigate Pivot Engine to Collect Bulk Screenshots ]]> https://www.domaintools.com/resources/blog/using-iris-investigate-pivot-engine-to-collect-bulk-screenshots/ Thu, 10 Nov 2022 04:00:29 +0000 48 DomainTools Research https://www.domaintools.com/?p=18334 There are times when an analyst would like to examine and capture images of a website (or set of websites) that may be of interest. This may be a matter of generally understanding “what a site is all about,” or there may be more specific goals such as confirming that a set of sites share […]

]]>
<![CDATA[ How to Not Give a Scam ]]> https://www.domaintools.com/resources/blog/how-to-not-give-a-scam/ Thu, 18 Feb 2021 00:00:00 +0000 51 DomainTools Research https://domaintools.wpengine.com/how-to-not-give-a-scam/ Learn about tactics attackers use for extortion emails and how to build a picture around raw data as the DomainTools team leads an investigation into a sextortion scam.

]]>
<![CDATA[ Leveraging Risk Scoring for Threat Hunting: DomainTools Risk Score ]]> https://www.domaintools.com/resources/blog/leveraging-risk-scoring-for-threat-hunting-domaintools-risk-score/ Thu, 12 Mar 2020 00:00:00 +0000 51 DomainTools Research https://domaintools.wpengine.com/leveraging-risk-scoring-for-threat-hunting-domaintools-risk-score/ As organizations grow their security strategies to include proactive tactics such as threat hunting, they are leveraging several different tools to accomplish their…

]]>
<![CDATA[ Strengthen Your Investigations’ Resolve with pDNS ]]> https://www.domaintools.com/resources/blog/strengthen-your-investigations-resolve-with-pdns/ Thu, 05 Mar 2020 00:00:00 +0000 51 DomainTools Research https://domaintools.wpengine.com/strengthen-your-investigations-resolve-with-pdns/ Learn how to use passive DNS to hunt through malicious domains to see the underlying infrastructure set up behind them, any DNS tunneling for C2 or data exfiltration happ

]]>
<![CDATA[ Unraveling A Telecom Billing Fraud Campaign Targeting UK Users ]]> https://www.domaintools.com/resources/blog/unraveling-a-telecom-billing-fraud-campaign-targeting-uk-users/ Thu, 20 Feb 2020 00:00:00 +0000 51 DomainTools Research https://domaintools.wpengine.com/unraveling-a-telecom-billing-fraud-campaign-targeting-uk-users/ DomainTools Security Research Team regularly monitors our domain collection. One site that came through recently was quite nefarious and yet to appear on any blocklist.

]]>
<![CDATA[ Spoofing Banks is a Balancing Act ]]> https://www.domaintools.com/resources/blog/spoofing-banks-is-a-balancing-act/ Thu, 30 Jan 2020 00:00:00 +0000 51 DomainTools Research https://domaintools.wpengine.com/spoofing-banks-is-a-balancing-act/ Join Senior Security Advisor, Corin Imai, for an investigation into known bad domains. In this blog, learn how to map connected infrastructure to expand from one indica

]]>
<![CDATA[ Hunting for RATs (Remote Access Trojans) ]]> https://www.domaintools.com/resources/blog/hunting-for-rats/ Tue, 14 Jan 2020 00:00:00 +0000 51 DomainTools Research https://domaintools.wpengine.com/hunting-for-rats-remote-access-trojans/ DomainTools and Askari Blue have teamed up to provide a playbook that encapsulates the workshop lesson ‘Hunting for RATs’ and guides the reader through a series of toolse

]]>
<![CDATA[ DomainTools 101: Looking at Greenbug’s DNS Tunneling in ISMDoor with DomainTools Iris Investigate ]]> https://www.domaintools.com/resources/blog/domaintools-101-looking-at-greenbugs-dns-tunneling-in-ismdoor/ Thu, 12 Dec 2019 00:00:00 +0000 51 DomainTools Research https://domaintools.wpengine.com/domaintools-101-looking-at-greenbugs-dns-tunneling-in-ismdoor-with-domaintools-iris-investigate/ Thanks to the specific fingerprints of the ISMDoor malware we can keep an eye on current activity and reference past activity through Iris by looking for AAAA records tha

]]>
<![CDATA[ Iris Investigations At-A-Glance: How to Pivot on Domain Data for Agile and Intelligent Threat Response ]]> https://www.domaintools.com/resources/blog/iris-investigations-at-a-glance-how-to-pivot-on-domain-data/ Thu, 31 Oct 2019 00:00:00 +0000 51 DomainTools Research https://domaintools.wpengine.com/iris-investigations-at-a-glance-how-to-pivot-on-domain-data-for-agile-and-intelligent-threat-response/ Last year, Japanese authorities reported a sophisticated and aggressive phishing campaign using websites spoofing Sagawa Express Co., a major shipping and logistics compa

]]>