<
div class=”block-paragraph_advanced”>
Background
My story started a few months ago, when I performed a red team assessment for a major retail company. During the Open Source Reconnaissance (OSINT) phase, I reviewed the SSL certificates that included the client name. In these certificates I identified that the client owned its own top-level domain (TLD). A TLD is the last part of a domain name, the letters that come after the final dot. For example, in the domain name “google.com,” the TLD is “.com”. Companies such as Google own many TLDs, including .goog, .go, and .google. Google manages all of those TLDs and the domains underneath them (for example, “site.goog”).
Owning TLDs is not uncommon. The following table lists various companies and the TLDs they own (for a full list of TLDs, see TLD-List or IANA List):
Company |
[…] Content was cut in order to protect the source.Please visit the source for the rest of the article. This article has been indexed from Threat Intelligence
Read the original article: Post navigation |