You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I see. I think the approach of blocking all entrypoints to changing the DNS resolver IP (e.g. dns.setServers, and lookup, resolve) and only allowing resolvers known ahead of time.
I found another bypass, this time on the network (HTTP(S)) access control side.
It's possible to specify a custom IP address resolver which will resolve the whitelisted domain name to a malicious, attacker planted, IP address.
e.g:
The text was updated successfully, but these errors were encountered: