May 25, 2023, 12:30 p.m. | Unknown ([email protected])

KitPloit - PenTest Tools! www.kitploit.com

<p style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEgJ7psudS9vxKSRrIOFqYXlKBQT7zbhNdUdoZyP0Ljp7-PEAr9fuhUZ_my13Hw79lY-OJkoQuRCy1k1kXKK-RK85zPp0xjSvsJC2oJl64nsESxSCf9lw8TJY0v9m6vdQQgqP9KOMM16Td3GBlJTAW6Y1oXIiMi3X5UJggiCIfQw5iP72XoerGMNT0m7ww"><img alt="" border="0" height="480" id="BLOGGER_PHOTO_ID_7233974346992075906" src="https://blogger.googleusercontent.com/img/a/AVvXsEgJ7psudS9vxKSRrIOFqYXlKBQT7zbhNdUdoZyP0Ljp7-PEAr9fuhUZ_my13Hw79lY-OJkoQuRCy1k1kXKK-RK85zPp0xjSvsJC2oJl64nsESxSCf9lw8TJY0v9m6vdQQgqP9KOMM16Td3GBlJTAW6Y1oXIiMi3X5UJggiCIfQw5iP72XoerGMNT0m7ww=w640-h480" width="640" /></a></p><br /> <p dir="auto"><code>rebindMultiA</code> is a tool to perform a Multiple A Record rebind attack.</p> <p dir="auto"><code>rebindmultia.com</code> is a domain that I've set up to assist with these attacks. It makes every IP its own authoritative <a href="https://www.kitploit.com/search/label/Nameserver" target="_blank" title="nameserver">nameserver</a> for the domain <code>[IP].ns.rebindmultia.com</code>. For example, <code>13.33.33.37.ns.rebindmultia.com</code>'s authoritative nameserver is <code>13.33.33.37.ip.rebindmultia.com</code> which resolves (as you might have guessed) to <code>13.33.33.37</code>.</p><span><a name='more'></a></span><p dir="auto"><br /></p> <h2 dir="auto" tabindex="-1">Multiple A Record Rebind Attack</h2> …

rebindmultia up-to-date windows

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Cybersecurity Consultant- Governance, Risk, and Compliance team

@ EY | Tel Aviv, IL, 6706703

Professional Services Consultant

@ Zscaler | Escazú, Costa Rica

IT Security Analyst

@ Briggs & Stratton | Wauwatosa, WI, US, 53222

Cloud DevSecOps Engineer - Team Lead

@ Motorola Solutions | Krakow, Poland