(no title)
DGAP | 9 months ago
I also found this open source tool for sandboxing to be useful: https://github.com/bullfrogsec/bullfrog
DGAP | 9 months ago
I also found this open source tool for sandboxing to be useful: https://github.com/bullfrogsec/bullfrog
mstade|9 months ago
cedws|9 months ago
mdaniel|9 months ago
I believe a sufficiently sophisticated attacker could unwind the netfilter and DNS change, but in my experience every action that you're taking during a blind attack is one more opportunity for things to go off the rails. The increased instructions (especially ones referencing netfilter and DNS changes) also could make it harder to smuggle in via an obfuscated code change (assuming that's the attack vector)
That's a lot of words to say that this approach could be better than nothing, but one will want to weigh its gains against the onoz of having to keep its allowlist rules up to date in your supply chain landscape
DGAP|9 months ago
vin10|9 months ago