This question's wording belies immense technical difference in what they want for security education, and what they are literally asking.
They are asking for the highest-level privately owned domain. Determining this is actually really complicated to authoritatively answer. 🧵👇
The domain name system is read right-to left.
three.two.one(.<start here>)

To make security decisions, you want to determine when a potentially untrustworthy individual entity starts to control the string.

google.example.com starts at example. Easy.
BUT...🚨
Just saying look at the second-level domain doesn't work because
1.) The top-level-domain could be privately owned
2.) The second-level domain may still be owned by countries, infrastructure services firms, private registrars.
For example, here's the -EFFECTIVE- TLDs for India. Image
There's also infrastructure. Here's an incomplete list of domains that any Microsoft customer can register privately and put anything they want on. It's Microsoft, but NOT Microsoft.

Stuff like "…lDownloadServer.blob.core.windows.net" could be anybody despite saying Windows. Just terrible. Image
For this reason, the concept of the Public Suffix List was developed, to inventory WHERE PRIVATE CONTROL OF DOMAIN CONTENT ACTUALLY STARTS in a multi-part domain name.
wiki.mozilla.org/Public_Suffix_…
Actual list: IT'S REAL FRIGGEN LONG.
publicsuffix.org/list/public_su…

Unfortunately... Image
Even domain names completely controlled by trustworthy companies can still host malicious content.
A download from storage.googleapis.com is often just malware.

These design decisions were some of the most disastrous abdications of internet ecosystem stewardship in modern times
I could keep talking for quite a bit longer about all the extensive technical knowledge you need to determine what to trust before you even click something. The correct answer is turn your router off and go outside.
Anti-toxicity notice: You'll notice I never upbraid the writer of the question, and instead comment on the technical distance between what users are taught as simple enough to be vaguely effective, and the true complexity.
Frankly, I have no idea how'd I approach teaching this.
Just what I tweeted takes multiple lectures to fully convey, to a beginning SOC analyst, trying to competently address web-based threats. We didn't even get into what comes AFTER the domain in common patterns on compromised websites used for malware delivery. It expounds forever.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with SwiftOnSecurity

SwiftOnSecurity Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @SwiftOnSecurity

13 Nov
In 1988, two men sit in a room. One of them is cryptographer Bob Morris, the father of Robert Morris, who had just released the first Internet worm.

"A line had been crossed and the world we inhabited had changed."

(@johnmccumber, Assessing&Managing Security Risk in IT Systems)
Book excerpt: "In 1988, a young graduate student at Cornell University released the first destructive Internet worm. Late one night in November of that year, it crashed thousands of connected computer systems and startled computer administrators and government officials alike."🧵
"Shortly after that incident, I learned about it from my supervisor, who was also this young man’s father. As I sat with Bob Morris in his office that early morning, he motioned me to shut the door so he could try to get away with smoking in the government office building."
Read 6 tweets
8 Nov
On technical communication:
The authority of the sender and the mental capability of the recipient are irrelevant.
Communication is to achieve results. If it is not succeeding, the communication and environment should be changed until it does. Anything else is whining.
I worked in Helpdesk. I've written communications to a thousand people asking them to do something in their own interest. When that didn't happen, I sat and stewed and left them to their fate.
That also achieved nothing. Value judgements are pointless. Find out how to get results
Communication is its own form of hacking. You find out what the recipient responds to, makes time for, and then is convinced to act on.
This is often simpler and dumber and without the detail you think it expects. In fact, leaving stuff out is often critical. Find out how to win.
Read 4 tweets
3 Nov
ADEPT-LEVEL IT TROUBLESHOOTING:
In this series, I will lay concepts and processes for ascertaining technical causes of IT failures and outages.
🎖I am a Microsoft MVP in Windows management, worked 10 years in Helpdesk and System Engineering, and now work as an F500 Security IC.
⭐️LESSON 1: EXECUTION CONTEXT
You initiate a process that should work. But it seems like it can't access what it needs. For example, you make a machine login script on a network share, but logs access denied. Or, you launch a process, and the target you have access to can't open.
A critical, advanced IT troubleshooting concept is understanding _execution context_.
You see a machine with everything on one screen. Diagnostic tool or another tool should have same experience as other apps, right? If you can access file, everything else should? No.
Explained:
Read 24 tweets
2 Nov
Please note I am a real person I have met @hacks4pancakes multiple times and been to @tarah + @deviantollam's house.
Just to be clear Tarah was there I did not break in.
The emplaced gun turrets were a nice touch props to @deviantollam tho
Read 7 tweets
2 Nov
Not everything can be captured on phone cameras (40D 70-200 f/2.8) Car windshield in rain show...
Note the 40D is a DSLR from 2007, over 14 years ago.
Your prosumer camera and even lower-tier lenses were unimaginable when I was getting into photography. Image
The biggest advancement in sensors in my mind has been low-light performance. It's just unimaginable how clear night photography has become. This was as good as I could get it in 2009. (South Silicon Valley as seen from turnoff near Lick Observatory, 40D 24-105 f/4) Image
Read 5 tweets
27 Oct
If you are junior IT in small to medium biz, isolated, caring about critical security issues you learn about daily as you expand your knowledge — I've been right the fuck exactly where you are. Years isolated, stewing in humiliation.

Here's what I learned the hardest way, alone:
1.) It is naively admirable to identify yourself and take personal stake in security of your employer's network. It sounds like a way to establish personal investment in the success of a project.
But it's a false idol. Be passionate on aims, but not occlusive in career scope.
Sidebar: Power is restraint.
Technical command of a subject – ability to speak authoritatively to others – is not itself correctness or effectiveness. Biting your tongue is not weakness.
It's strategy. Only you know your mind. Choosing not to strike rhetorically is discipline.
Read 4 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Thank you for your support!

Follow Us on Twitter!

:(