zlacker

[return to "Tunnl.gg"]
1. rany_+M7[view] [source] 2025-12-04 11:29:50
>>klipit+(OP)
This is a great idea but I'm a bit concerned about your bandwidth costs and illegal/malicious content being hosted used under your domain.

For the second point, you might want to implement some kind of browser warning similar to what Ngrok does.

◧◩
2. klipit+r8[view] [source] 2025-12-04 11:34:17
>>rany_+M7
Thats a fair point, there are some protections in place for abuse already. I will have a look at what ngrok does for browser warnings. Thanks a lot for the suggestions.
◧◩◪
3. gnfarg+ia[view] [source] 2025-12-04 11:48:34
>>klipit+r8
Be aware of threat actors, too: you're giving them an easy data exfil route without the hassle and risk of them having to set up their own infrastructure.

Back in the day you could have stood up something like this and worried about abuse later. Unfortunately, now, a decent proportion early users of services like this do tend to be those looking to misuse it.

◧◩◪◨
4. skrebb+Nb[view] [source] 2025-12-04 11:57:57
>>gnfarg+ia
What's a "data exfil route"?
◧◩◪◨⬒
5. lionko+wc[view] [source] 2025-12-04 12:03:11
>>skrebb+Nb
I'm not who you asked, but essentially, when you write malware that infects someone's PC, that in itself doesn't really help you much. You usually want to get out passwords and other data that you might have stolen.

This is where an exfil (exfiltration) route is needed. You could just send the data to a server you own, but you have to make sure that there are fallbacks once that one gets taken down. You also need to ensure that your exfiltration won't be noticed by a firewall and blocked.

Hosting a server locally, easily, on the infected PC, that can expose data under a specific address is (to my understanding) the holy grail of exfiltration; you just connect to it and it gives you the data, instead of having to worry much about hosting your own infrastructure.

◧◩◪◨⬒⬓
6. ale42+qe[view] [source] 2025-12-04 12:15:04
>>lionko+wc
> Hosting a server locally, easily, on the infected PC, that can expose data under a specific address is (to my understanding) the holy grail of exfiltration; you just connect to it and it gives you the data, instead of having to worry much about hosting your own infrastructure.

A permanent SSH connection is not exactly discreet, though...

[go to top]