article thumbnail

What is Passive DNS and how do you leverage it in research?

CTOvision

The concept was created in 2004 to help mitigate the threat of malware but is now used for that and far more use cases. This can help identify who is infected with malware and help identify who is benefiting from the malware. Bob Gourley. Passive DNS has become one of the most powerful tools in the defenders arsenal.

article thumbnail

MadoMiner Part 2 - Mask

AlienVault

In addition, take care with this portion of the malware. Malware Analysis. Sogou.exe is the payload that contains the CPUInfo scanner, however, it has been set to scan for IPV6 addresses. In addition, in Sogou.exe, MadoMiner appears to search for IPV6 addresses that are vulnerable to EternalBlue, as well as installs some tasks.

Malware 40
article thumbnail

Implementing a Secure Transit DMZ Architecture with Next-Gen Firewalls

Aviatrix

You can use both IPv4 and IPv6 in your VPC for secure and easy access to resources and applications. Since then Aviatrix has implemented hundreds of transit architecture solutions to simplify enterprise cloud connectivity. One common component of that architecture is the use of a firewall. Transit DMZ Architecture Diagram.