Jean Sérien
banner
huberdine.bsky.social
Jean Sérien
@huberdine.bsky.social
Reposted by Jean Sérien
Yes this whole world is full of trash BUT there's still a lot of good. I dare you to read this story to the end and tell me your eyes are still dry. I dare you.
December 26, 2025 at 3:51 PM
Reposted by Jean Sérien
Je déclare ouverte ma liste personnelle de one-panel-comics préférés.
Pour marquer sa subjectivité elle commencera par la Joconde des one-panel, à savoir "Cow Tools", par Gary Larson.
November 15, 2025 at 5:27 PM
Reposted by Jean Sérien
Command and Control & Tunnelling via DNS
Command and Control & Tunnelling via DNS
An attacker has compromised a server. They try to connect out, but every port is blocked by a restrictive firewall… Except one: Port 53 (DNS). For most networks, DNS is the one protocol that is always allowed out. Attackers know this, and they exploit it. By “tunneling” their Command & Control (C2) traffic inside normal-looking DNS queries, they can remain completely hidden. This is a classic Advanced Persistent Threat (APT) technique. In this guide, we’ll do a full end-to-end exercise. First, we’ll put on our Red Team hat and use dnscat2 to perform the DNS tunneling attack. Then, we'll switch to the Blue Team , ingest our logs into a SIEM, and write the exact queries to hunt for this activity. Overview of This Write-Up DNS Tunneling Demonstration: Performed DNS tunneling using dnscat2 to understand how command-and-control traffic can be hidden inside DNS queries. Lab Setup: Configured attacker and victim machines to simulate real-world DNS tunneling behavior. Log Forwarding to SIEM: Forwarded DNS logs from Zeek (installed on Ubuntu) to Splunk for centralized monitoring. Detection and Alerting: Created SPL queries, built detection rules, and configured alerts in Splunk to identify suspicious or abnormal DNS activity. What is DNS? DNS stands for Domain Name System, and it’s like the phonebook of the internet. When you type a website address (like www.google.com) into your browser, DNS is the system that translates that human-readable domain name into an IP address (like 172.217.3.110) that computers use to communicate with each other. How Does DNS Work? You type a Domain Name: When you want to visit a website, you type the domain name (e.g., www .learnthenet.net ) DNS Query: Your computer sends a request (DNS query) to a DNS server to find out the IP address associated with that domain name. DNS Server Response: The DNS server looks up the domain name and returns the corresponding IP address. Access the Website: Your browser can now use that IP address to connect to the website and display the page. What is DNS Tunneling? DNS Tunneling is a method used to send or receive hidden data by embedding it inside DNS queries and responses. DNS is usually trusted and allowed through firewalls, so attackers use this trick to bypass security systems and communicate with hacked systems. How DNS Tunneling Works Using dnscat2? The dnscat2 tool works in two modes : dnscat2-server  — This runs on the attacker’s machine (Kali). It works like: 1. A DNS server to receive DNS requests 2. A command listener to control the target dnscat2-client  — This runs on the target machine (Ubuntu). It sends DNS requests to the attacker’s server. What Happens Step-by-Step First, the attacker hacks the target system. After gaining access, the attacker wants to communicate secretly without being detected. To do this, they install the dnscat2-client on the target machine. Now, the target starts sending DNS packets to the attacker’s DNS server. These DNS packets look normal, but the subdomain part (like xyz.hacker.com) contains encoded data (like commands or messages). The attacker’s dnscat2-server receives this DNS request, decodes the data, and processes the command. If there is a response, the reply is sent back in a similar DNS packet with encoded content. This entire process hides the communication inside DNS traffic, which makes it look like normal internet activity. Lab SetUp Step 1 : Install ‘dnscat2’ Server on Attacker Machine Update package lists sudo apt update Install Ruby and Git, sudo apt install ruby git Clone the dnscat2 repo git clone https://github.com/iagox86/dnscat2.git Go into the server directory cd dnscat2/server Install Bundler (Ruby dependency manager) sudo gem install bundler Install required Ruby gems sudo bundle install After this, you can start the DNS server with: sudo ruby ./dnscat2.rb Step 2 : Install the dnscat2 Client on the Victim Install Go and Git sudo apt install golang git Clone the dnscat2 repo git clone https://github.com/iagox86/dnscat2.git Go into the client directory cd dnscat2/client sudo apt-get install make Compile the client make Once the compilation is complete, you will be able to use the dnscat2 client tool on the target machine. Before this, we had already started the dnscat2 server on the attacker machine. When you run the server, it will display a command that needs to be executed on the client side. Copy the command, navigate to the dnscat2/client directory, paste the command, and replace the IP address in the server field with the attacker’s IP address. Once you run the command on the target machine and it shows “session established,” it means the target machine has successfully connected to the attacker’s server. When you go back to the attacker machine (DNS server), it will show “new window created: 1” , which means the target machine has successfully connected to the attacker’s system. The next step is to control the target system remotely. To do this, we need to get a shell on the target machine. Follow the upcoming stages carefully to establish a remote shell and begin controlling the target system. Enter “sessions”, and it will show you active sessions on the server sessions Next, use the active session session -i 1 Enter “shell” , and it will create a new shell session on the target machine. Through this session, you can enter commands here, and they will be executed on the target system. shell A new shell session has been created. The next step is to use that session to interact with the target machine. session -i 2 Now that we have successfully obtained the target shell, let’s see how the data packets between these two devices are transmitted through Wireshark. When you filter for DNS, you will be able to see several DNS packets passing between the attacker machine and the target. By examining the DNS packet query, you can observe that the requested domain is encoded. This means that any command or activity entered on the attacker machine will be encoded and added to the query field, then sent to the target. The target machine performs the same encoding and sends the query back to the attacker. SIEM DETECTION Now we have set up the lab and performed a basic DNS tunneling attack to understand how it works. Next, we will focus on detecting this activity using a SIEM by creating a custom alert. When triggered, this alert will notify us of suspicious DNS tunneling behavior. To do this, I am using Zeek as the log source and Splunk as the SIEM. My Zeek instance is installed on Ubuntu. If you haven’t set up Zeek yet, follow this blog: “Zeek Setup Guide” If you haven’t set up Splunk yet, follow this blog: “ Splunk Setup Guide. ” You can view the DNS logs on the Ubuntu system (target machine) at the following location /opt/zeek/logs/current/dns.log We can forward this log to the SIEM for analysis and alerting. sudo /opt/splunkforwarder/bin/splunk add monitor /opt/zeek/logs/current/dns.log we get dns logs in siem 😊 When we look at the logs, the “query” field contains the domain names entered by the user. In the case of DNS tunneling, the data is encoded and inserted into the “query” field. This results in unusually long domain names. By analyzing the length of DNS queries, we can detect abnormal entries—queries that are significantly longer than usual—indicating potential tunneling activity. index=* | eval Query_Lengh = len(query) | where Query_Lengh > 30 | table id.orig_h, id.resp_h, query, Query_Lengh This SPL query will return DNS queries with a length greater than 30, along with the sender device IP, receiver device IP, the query itself, and its length all in a table format. Lets create alert Previously, we observed multiple DNS queries with a length greater than 30. We can use the same SPL query to create an alert in Splunk. index=* | eval Query_Lengh = len(query) | where Query_Lengh > 30 Save as → alert Give the alert a title like “DNS Tunneling” and “ Alert type : Real time” and leave the other settings at their default values. Add actions → Add to Triggered Alerts Save Let’s trigger the alert Perform some activity using the dnscat2 server (C2C server) to generate DNS tunneling traffic. Navigate to Activity → Triggered Alerts , where you can see the alert that was triggered. We successfully triggered the alert. However, not every log with a long DNS query indicates DNS tunneling some of them may be genuine. Sometimes, users or systems may query domains longer than 30 characters for legitimate reasons. As a Security Analyst or SOC Analyst, your job is to investigate further and determine whether it’s actually DNS tunneling or just normal communication. Command and Control & Tunnelling via DNS was originally published in InfoSec Write-ups on Medium, where people are continuing the conversation by highlighting and responding to this story.
infosecwriteups.com
December 15, 2025 at 11:17 AM
Reposted by Jean Sérien
L'assaut de Bolloré sur l'Histoire.
Il se passe des choses graves dans l'édition de livre d’Histoire en France, notamment à cause du milliardaire d'extrême droite. Fil d’explication à dérouler ⬇️⬇️⬇️⬇️ 1/
December 8, 2025 at 10:35 AM
Reposted by Jean Sérien
Volé en face.
November 29, 2025 at 5:13 PM
Reposted by Jean Sérien
Je suis pour une loi qui autorise tout citoyen a défoncer la gueule de quelqu'un qui fait un salut nazi. C'est même un minimum.
November 27, 2025 at 5:29 PM
Reposted by Jean Sérien
Le drame
November 26, 2025 at 5:19 PM
Celui de Capra c’est une des premières cassette vidéo qu’on a eu à la maison quand j’étais gamin, alors difficile des lutter !
Fun fact : la vraie liste comporte deux fois "La vie est belle" (celui de Capra, et celui de Benigni)
November 12, 2025 at 7:43 PM
Reposted by Jean Sérien
Ce matin, je vous parle d'IA générative et des personnes étrangères

2 prémisses
1. L'IA générative a un énorme avantage : elle comprend toutes les langues, répond ds ttes les langues et passe d'une langue à une autre en 1 seconde
2. Toutes les associations de France voient leur budget s'effondrer
November 9, 2025 at 7:31 AM
Reposted by Jean Sérien
Mais est-ce qu'un jour dans ma vie Sorj Chalandon écrira ou dira quelque chose qui ne me fera pas pleurer ? ❤️
(Non)
November 7, 2025 at 5:14 AM
Reposted by Jean Sérien
"Le navigateur Atlas de OpenAI : un navigateur anti‑web "

👉 www.anildash.com//20...
October 30, 2025 at 5:43 PM
Reposted by Jean Sérien
Court fil général : pourquoi entretenir les prairies ? Il faut donc entretenir la nature ?
Ben oui (parfois) car en fait, nous ne sommes pas dans "la nature". 🧵
On est heureux de voir cette prairie naturelle de Châtillon en Vendelais, entretenue par des étudiants du lycée agricole BTS GPN.
Le travail de l'asso Mysotis environnement mérite (beaucoup) des félicitations et d'encouragements 👏👏
www.facebook.com/landedelaren...
October 24, 2025 at 10:59 AM
Reposted by Jean Sérien
Alternatives do exist e.g. git.deuxfleurs.fr/Deuxfleurs/g... ? One door closes, ten new one pop up 😅
garage
S3-compatible object store for small self-hosted geo-distributed deployments
git.deuxfleurs.fr
October 22, 2025 at 6:11 PM
Reposted by Jean Sérien
"Y a des hommes, avec XY, des femmes, avec XX, et le reste c'est idéologie et contre-nature-han."
Ou pas.
Voire pas du tout, même. 🧵
In 1890, the X and Y chromosomes were discovered. It was found that the men who were tested had 46 chromosomes, including an X and a Y, while women who were tested also had 46 chromosomes, including 2 X chromosomes.
So obviously the conclusion was that the Y chromosome defined masculinity.
October 17, 2025 at 1:52 PM
Reposted by Jean Sérien
Le Pr Didier Raoult définitivement sanctionné de deux ans d'interdiction d'exercice
https://www.apmnews.com/story.php?objet=428695
October 14, 2025 at 4:52 PM
Reposted by Jean Sérien
J'ai le plaisir, que dis-je, l'Honneur, de vous présenter une nouvelle création : PVMSS.
Il s'agit d'une application pour Proxmox, permettant à vos utilisateurs d'avoir un portail de création de machine virtuelle.

j.hommet.net/pvmss/
#Proxmox
Proxmox VM Self Service (PVMSS)
Mon constat en juin 2025, après plus de 10 ans à observer et à répondre aux besoins dans différentes situations où j'ai utilisé Proxmox, est qu'il manque une interface de création de machine virtuelle...
j.hommet.net
October 13, 2025 at 11:07 AM
Reposted by Jean Sérien
Aujourd'hui, Lecornu a démissionné. Ou peut-être hier, je ne sais pas. J'ai reçu une notification de Bluesky : “Lecornu démissionné. Dissolution demain. Sentiments distingués.” Cela ne veut rien dire. C'était peut-être hier.
October 6, 2025 at 12:30 PM
Reposted by Jean Sérien
Elle a plus de courage que toute la classe politique occidentale réunie, suite.
(On rappelle qu'elle est autiste. Pourvu qu'elle ne paie pas un jour le prix très fort pour tout ce qu'elle subit à cause de son engagement.)
““They dragged little Greta [Thunberg] by her hair before our eyes, beat her, and forced her to kiss the Israeli flag. They did everything imaginable to her, as a warning to others,” the Turkish activist ErsinÇelik, a participant in the Sumud flotilla, told Anadolu news agency.”+
Israel accused of detaining Greta Thunberg in infested cell and making her hold flags
Activist tells Swedish officials she has been subjected to harsh treatment, including insufficient food and water
www.theguardian.com
October 4, 2025 at 8:36 PM
Reposted by Jean Sérien
Aux États-Unis, des femmes prisonnières d'un monde d'hommes

Mais quel enfer bordel. Et les nationalistes chrétiens une belle bande de trouducs.

www.rts.ch/info/monde/2...
Aux États-Unis, des femmes prisonnières d'un monde d'hommes
Certaines sont en prison pour des crimes commis par leur conjoint. D'autres, à peine adolescentes, sont obligées d'épouser leur violeur, ou d'accoucher d'un enfant issu d'un inceste. Le documentaire "...
www.rts.ch
September 20, 2025 at 6:28 AM
Reposted by Jean Sérien
vous vous souvenez les statues dorées de femmes lors de la cérémonie d'ouverture des JO? un temps elles étaient à l'Assemblée nationale, mais fallait réserver pour les voir. et là je les ai découvertes à la Porte de la chapelle. Ben moi je trouve qu'elles ont de la gueule là, en tout cas ça m'a plu!
September 14, 2025 at 8:41 PM
Reposted by Jean Sérien
September 14, 2025 at 10:46 PM
Reposted by Jean Sérien
I am reading a book on Fascism in France in the first half of the 20th century, and the book reminded how the French military disaster of May 1940 was immediately given two political explanations, who were both completely wrong, but turned out to be extremely persistent. A thread.
September 14, 2025 at 6:19 PM
Reposted by Jean Sérien
September 3, 2025 at 9:04 PM
Reposted by Jean Sérien
Mis-issued TLS Certificates for 1.1.1.1 DNS Service Enable Attackers to Decrypt Traffic
Mis-issued TLS Certificates for 1.1.1.1 DNS Service Enable Attackers to Decrypt Traffic
cybersecuritynews.com
September 4, 2025 at 5:21 AM