TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Hackers increasingly abuse Cloudflare Tunnels for stealthy connections

21 pointsby momirlanalmost 2 years ago

3 comments

willglynnalmost 2 years ago
&gt; Furthermore, as Cloudflare Tunnel requires the installation of the &#x27;cloudflared&#x27; client, defenders can detect its use by monitoring file hashes associated with client releases.<p>Is this effective? Presumably attackers could `go build` their own binaries to get equivalent clients with different hashes, or even combine the open-source `cloudflared` internals with a larger payload.
评论 #37048210 未加载
justinludwigalmost 2 years ago
Comments from a similar article posted yesterday: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=37023806">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=37023806</a>
neodymiumphishalmost 2 years ago
I&#x27;m the author of the source blog. Happy to answer any questions about the research I conducted on this! Was a fun project to run through and discover additional attack vectors!
评论 #37044415 未加载