Hacker News new | past | comments | ask | show | jobs | submit login

This kinda surprises me, what is so "dramatic" about cloudfared specifically? This seems just like another reverse tunnel tool, and there are plenty of them.

I am not working with malware specifically, but in the past I've used ssh tunnels, random one-off websocket thingy we wrote, wireguard tunnel, frp proxy, and even AWS SSM agent to get access to machines with all incoming connections blocked. They are pretty simple to setup and generally cannot be blocked with whitelist block already.

(and I bet that for malware, they are worse than cloudfared. Based on CF's reputation, they take security reports seriously, so I would not be surprised if they take down malicious tunnels fast. While random VM on low-cost hosters will probably takes days to respond.)




> This seems just like another reverse tunnel tool, and there are plenty of them.

These are known though, you can block them without causing issues.

> and even AWS SSM agent to get access to machines with all incoming connections blocked

SSM is awesome, but the ways it works... I have no idea how. I think though that it uses outbound connections, but unfortunately AWS SGs can't do deny rules.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: