Thanks for all the good stuff Polunus. your descriptive instructions were a welcome relief. I am in the process of re-building my ‘security testing terminal’ so I can get the stuff Ill want to forward to correct individuals. But with the American GOP Congress holding veteran pay as a hostage tool… all my funds are being saved for a possible Holiday season of absolute struggle… sorry to talk about politics but this is my reality right now.
Now… back to the DNS exploitation across the console I specified. I did some simple testing of my hypothesis and it seems to be becoming more evident as actual occurrence. My buddy, who uses the same console and playing the same program {BFFOUR}… who was unaware the “secure” setup XFinity left him with was not all that secure… from broadcasting his SSID to ZERO WiFi MAC filtering… had been getting weird errors from his console about DNS issues and it was taking him 40+ minutes to re-connect.
I went to his house and we used the dedicated DNS server my IPS lets use when not on the network. He stopped getting the DNS connection errors and instead would freeze up about every third game for no reason. So iit does seem, with the limited testing Iv done, that DNS manipulation is occurring over that specific game, it ONLY happens when playing this one ‘beta’ game while every other game I have (over 100 downloads) acts just fine.
But the research on this is showing that DNS manipulation is on a HUGE rise right now so I figured it would be a great thing for my FAVORITE security vendor to be the one to uncover.
Again Polunus, thanks for your details so I can add some additional coding when I get my ‘VORTEX’ machine set up to silently monitor Tx. The main topic is DNS exploitation and Im hoping we can prevent Avast users, as well as others, from becoming victims as during the DNS Malware Changer episodes two years ago.
Ohh… and I use very strong encryption methods myself. 32 digit private SSID’s to 63 ASCII WPA2 (AES) keys to random 20-24 length Windows passwords to wireless AC filtering and DHCP reservations with no open IP assignments. Never use UPnP and ALWAYS turn off Remote Managemnet; both on my routers and devices. If you have followed me then you should have guessed that’s been what Iv had since Wifi was released. Im not trying to pass off any BS in my claims of what I did for the USMC and why the USMC servers have been the most secure in the world… its what I actually did.
I have never used WPS. that’s just silly and asking to be hijakt. But this is good stuff for ANY Avast member to know if they are not doing it already. Most novice users that come here with exploitation complaints usually will boil down to one of the things you talk about in securing a router and has NOTHING to do with the AV client installed.
AWESOME LOOKIN OUT!!! SEMPER FIDELIS AND OORAH!!!
OFF TOPIC: I like to use the below website for a plethora of tools; including random key generators to hash encryption testing:
https://www.grc.com/passwords.htm
Im sure you’ll find a tool or two that will blow you away. If this hasn’t been added to the sticky of great websites for Avast forum users… Id ask Avast review the site then add it to the list.