Skip to content

Commit

Permalink
Major update with modularity support
Browse files Browse the repository at this point in the history
  • Loading branch information
ivan-jedek committed May 8, 2024
1 parent 91254d0 commit 07d1a00
Show file tree
Hide file tree
Showing 3 changed files with 368 additions and 2,462 deletions.
11 changes: 11 additions & 0 deletions changelog
Original file line number Diff line number Diff line change
@@ -1,3 +1,14 @@
08/May/2024
- added support for standalone feature modules in the form of `.toml` files
- moved the majority of existing features to a modular format
- major cleanup of the polardns codebase
- major review of the variables scope and naming conventions in the code
- adopting a more object-oriented approach for DNS request and DNS response variables

07/May/2024
- release version 1.0
- relocated the BHMEA presentations to another online location

31/Jan/2024
- removed the empty1 test from test.sh, because dig behaves differently when run remotely vs. locally due to ethernet padding
- removed the hard coded IP in the sed command
Expand Down
4 changes: 2 additions & 2 deletions docs/pptx/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,5 +2,5 @@

PolarDNS was presented at [Black Hat MEA 2023](https://blackhatmea.com/) in the following sessions:

- [Session 1](https://blackhatmea.com/session/attacking-dns-resolvers-server-side-fun-and-profit): Attacking DNS resolvers from the server-side for fun and profit ([pptx](https://dns-research-public-pptx.s3.us-east-2.amazonaws.com/BHMEA23-Briefing-Attacking_DNS_Resolvers_From_Server-Side.pptx))
- [Session 2](https://blackhatmea.com/session/polardns-new-specialized-dns-server-penetration-testing-and-vulnerability-research): PolarDNS: New specialized DNS server for penetration testing and vulnerability research ([pptx](https://dns-research-public-pptx.s3.us-east-2.amazonaws.com/BHMEA23-Arsenals-PolarDNS_Specialized_DNS_Server_For_Penetration_Testing.pptx))
- [Session 1](https://blackhatmea.com/session/attacking-dns-resolvers-server-side-fun-and-profit): Attacking DNS resolvers from the server-side for fun and profit ([pptx](https://polardns-pub.s3.us-east-2.amazonaws.com/BHMEA23-Briefing-Attacking_DNS_Resolvers_From_Server-Side.pptx))
- [Session 2](https://blackhatmea.com/session/polardns-new-specialized-dns-server-penetration-testing-and-vulnerability-research): PolarDNS: New specialized DNS server for penetration testing and vulnerability research ([pptx](https://polardns-pub.s3.us-east-2.amazonaws.com/BHMEA23-Arsenals-PolarDNS_Specialized_DNS_Server_For_Penetration_Testing.pptx))
Loading

0 comments on commit 07d1a00

Please sign in to comment.