Welcome to SAYOR-Secure At Your Own Risk

Looking for cybersecurity services and tools to protect your business from digital threats? We provide Vulnerability Assessment & Penetration Testing (VAPT) tools, External Attack Surface Management (EASM) solutions, and real-time threat intelligence feeds. Our services include black box testing, threat exposure monitoring, CVE research, bot and payload analysis, takedown services, and digital risk management.Stay ahead of cybercriminals with IOC/IOA feeds, malware analysis, exploit detection, and proactive security insights. Whether you're searching for penetration testing, dark web monitoring, or cybersecurity consulting, we deliver actionable intelligence to safeguard your digital assets. Your Valued Partner in IT Trends and Cyber Security

Internet Dynamics, Fragility of Trust, and the Road to Digital Censorship

In today’s hyper-connected world, the very fabric of our digital lives is built on a series of trust relationships—relationships that are inherently fragile. From the backbone services that power the Internet to the software on our devices, a few critical components can ultimately determine who controls the flow of information. In this post, we’ll explore the inner workings of Internet infrastructure—from DNS root servers and Certificate Authorities (CAs) to Border Gateway Protocol (BGP) peerings—and discuss how our near-automatic acceptance of trust stores makes us vulnerable to state or corporate censorship.


1. The Backbone of the Internet: DNS, CAs, and BGP Peerings

DNS Root Servers: Gatekeepers of Global Connectivity

At the very core of the Internet lies the Domain Name System (DNS), a decentralized directory that translates human-friendly domain names into IP addresses. Although there are 13 designated root server operators, the reality is that most of these operators are controlled by American entities (such as Verisign and USC-ISI) with only a few exceptions from Europe and Japan . This centralization means that if these core nodes are compromised or manipulated, the effects can be global. An attacker—or a government intent on imposing censorship—could theoretically alter DNS responses, redirect traffic, or block access entirely, thus controlling what information reaches users.

Certificate Authorities: Trust, But Verify?

When you visit a website using HTTPS, your browser relies on Certificate Authorities (CAs) to verify that the site is who it claims to be. Major CAs, predominantly based in the West (such as DigiCert, Sectigo, and Let’s Encrypt), hold immense power over our online security. However, controversies such as the distrust of China’s CNNIC reveal that even these trust mechanisms are vulnerable. Users rarely question the default trust stores embedded in their browsers and operating systems, even though a single compromised or rogue CA could issue fraudulent certificates, potentially allowing for man-in-the-middle attacks and clandestine surveillance.

BGP Peerings: The Fragile Highways of Internet Traffic

The Border Gateway Protocol (BGP) is what routes Internet traffic between networks. Despite its critical role, BGP is notoriously vulnerable to hijacking and misconfiguration. In 2010, for instance, China Telecom was reported to have rerouted 15% of global Internet traffic through its network . Such incidents highlight how easy it can be for state actors or malicious entities to redirect or intercept traffic, effectively “censoring” the Internet by controlling the paths through which data flows.


2. User Acceptance: How Trust Stores Become Invisible Vulnerabilities

For most users, the concept of trust in the digital realm is abstract and rarely questioned. When you install a browser or an operating system, you implicitly agree to a default set of trust stores—lists of CAs that are considered safe. This passive acceptance creates a dangerous complacency. Many users do not review privacy policies or change default security settings, meaning that if the underlying infrastructure is compromised, they are unwittingly exposing themselves to risks of surveillance or censorship.

The “privacy paradox”—where users express concerns about privacy but take little action—extends to trust in digital certificates. Despite growing headlines about data breaches and privacy violations, the vast majority continue to rely on established trust stores, not realizing that these repositories of digital trust are controlled by a small group of organizations. This gap between concern and action leaves an opening for systemic manipulation.


3. The Pathway to Censorship: Exploiting Fragile Trust Mechanisms

Given these vulnerabilities, it is not hard to envision a scenario where a government or powerful corporation leverages control over DNS, CA’s, or BGP routing to implement widespread censorship. By altering DNS responses, for instance, authorities could redirect searches to propaganda sites or block access to dissident voices. Similarly, if a rogue CA were to issue fake certificates, encrypted traffic could be intercepted and manipulated without users’ knowledge. The fragility of BGP means that large-scale route hijacking could effectively cut off regions from global networks or funnel traffic through surveillance checkpoints.

This isn’t science fiction—these techniques are already in the toolkit of state-sponsored hackers and cyberwarfare units. When combined with the inherent passivity of users regarding trust store configurations, the modern digital infrastructure becomes alarmingly susceptible to censorship and control. In essence, the centralized nature of the Internet’s core trust mechanisms is the “Achilles’ heel” that makes a new era of digital censorship not only possible but, with minimal effort, imminently achievable.


Conclusion: Rethinking Trust and Decentralization

The current Internet ecosystem is a marvel of global connectivity—but it is built on layers of trust that can be easily undermined. The fragility of DNS root servers, Certificate Authorities, and BGP peerings, combined with widespread user complacency regarding digital trust stores, creates an environment ripe for censorship. As governments and corporations continue to expand their digital reach, the risk that our collective information will be manipulated, suppressed, or even erased grows ever larger.

To safeguard our freedom of expression and access to information, it is imperative to push for greater decentralization, transparency, and user education. Only by understanding these fundamental dynamics can we begin to reclaim control over our digital lives and protect the open exchange of ideas that defines a free society.


Let this be a call to action: question the defaults, demand transparency from our digital gatekeepers, and advocate for a more resilient, decentralized Internet that values privacy and free speech above all else.

1 year ago

Info Wars: How States and Corporations Could Hijack the Open Internet

Uncover the hidden vulnerabilities of the internet's core systems—TLS, BGP, and DNS—and explore how they can be exploited to compromise online security and freedom. Learn about potential threats and the importance of strengthening these protocols to protect the future of open communication.


Imagine an Internet where every click, every search, and every message is controlled by powerful forces—where the free flow of information is replaced by a curated stream of propaganda. Today’s Internet seems open and free, but beneath the surface lie critical vulnerabilities. If state or corporate actors exploit these weaknesses, our digital world could soon be unrecognizable.

1. Introduction: The Modern Digital Landscape

Our digital lives depend on mobile devices and a network of trust systems that, at first glance, ensure our security. However, the reality is more complex:

  • Mobile Usage:
    • 40% of users rely on Apple devices.
    • 50% use Android devices.
    • The rest use platforms like Xiaomi.
  • Trust Stores:
    • Apple’s Trust Store: Over 90% of its certificates come from major Western Certificate Authorities (CAs).
    • Android’s Trust Store: About 25–30% of certificates are sourced from regions such as China, Singapore, and Russia.

These numbers matter because every secure website you visit uses TLS (Transport Layer Security) to protect your data. But if the underlying systems are compromised, so is our privacy.

2. The Global Trust Stores: Who Controls Your Certificates?

Let’s break down who holds the keys to our digital safety:

  • Apple’s Trust Store:
    • Relies mainly on Western CAs.
    • Example: If the U.S. government pressured a CA to issue fake certificates for Chinese websites, it could decrypt all encrypted traffic, breaking TLS’s promise of privacy.
  • Android’s Trust Store:
    • A mix of Western and non-Western CAs.
    • Example: A breach in a non-Western CA could allow hackers to intercept private communications on a global scale.
  • Notable Breaches:
    • DigiNotar (2011): A single weak CA that shattered global trust.
    • Comodo and CNNIC incidents: Demonstrate that if one CA is compromised, millions of users are at risk.

(For more on how TLS can be undermined if one CA goes rogue, check out our previous exposé: “TLS Security: Only as Strong as the Weakest CA in Your Trust Store.”)

3. The Internet’s Hidden Vulnerabilities

TLS: Trust That Can Be Broken

Every secure website uses TLS to keep your data safe, but its security hinges on hundreds of CAs:

  • Key Point:
    • If a trusted CA is compromised or forced to issue fake certificates, encrypted traffic can be decrypted.
  • Real-World Example:
    • Imagine if the U.S. government mandated that all traffic to Chinese websites be monitored—by pressuring a CA to issue fraudulent certificates, they could inspect every encrypted communication.

BGP: The Internet’s Road Map Under Attack

BGP directs global data traffic, but its trust-based system is vulnerable:

  • Key Statistics:
    • North America: ~40 root server locations (32.5%)
    • Europe: ~35 locations (28.5%)
    • South America: ~6 locations (4.9%)
    • Africa: ~3 locations (2.4%)
  • Real-World Example:
    • In 2008, Pakistan Telecom’s attempt to block YouTube accidentally caused a worldwide outage lasting nearly two hours.
  • Hypothetical Scenario:
    • If China decided to block YouTube or ChatGPT for political reasons, it could announce specific BGP routes to divert or block traffic—disrupting global communications and innovation.

DNS: The Internet’s Address Book

DNS translates domain names into IP addresses, but its control is centralized:

  • Key Statistics:
    • North America: ~40 locations (32.5%)
    • Europe: ~35 locations (28.5%)
    • South America: ~6 locations (4.9%)
    • Africa: ~3 locations (2.4%)
  • Real-World Example:
    • A coalition within the EU or NATO could manipulate DNS records to redirect users from genuine news sites to state-sponsored propaganda portals, making it harder to find unbiased information.

4. How Info Wars Could Change the Game

States and corporations are already using digital tools to control narratives. Consider these scenarios:

  • Censorship and Propaganda:
    • In the US, proposals to ban TikTok on national security grounds show that even free societies can censor digital platforms.
    • In the EU, new regulations against hate speech have led to millions of content removal requests, forcing platforms to censor political posts.
    • In China, the Great Firewall blocks nearly 90% of foreign websites, serving as a model of extreme digital control.
  • Election Interference:
    • In the 2024 Pakistani general election, digital tools were allegedly used to manipulate vote counts and censor opposition voices. Such interference undermines democracy and leaves voters in the dark.
  • Covert Operations:
    • In September 2024, “Operation Grim Beeper” saw thousands of pagers rigged with explosives detonate in Lebanon, killing over 40 people and injuring more than 3,500. This operation, reportedly orchestrated by Israel’s Mossad, highlights how easily everyday devices can be weaponized.

5. A Simple, Bold Solution: Blockchain-Based Accountability

Blockchain offers a powerful way to safeguard our digital future:

  • Immutable Transparency:
    • Record every change in CA certificates, DNS servers, and BGP routes on a permanent public ledger.
  • Decentralized Verification:
    • Spread control across multiple trusted parties so no single entity can dominate the system.
  • Real-Time Alerts:
    • Continuous monitoring can quickly flag suspicious changes, enabling swift responses.
  • Empowered Users:
    • Decentralized control ensures that decisions about our digital environment remain in the hands of the public, not just powerful governments or corporations.

6. Conclusion: The Open Internet at a Crossroads

The open Internet we enjoy today is built on systems that appear strong—TLS, BGP, and DNS—but each has critical vulnerabilities. Historical events like the DigiNotar breach, the 2008 YouTube outage, and the explosive pager attack of 2024 reveal that our digital freedom is at risk.

If state or corporate actors exploit these weaknesses:

  • Global traffic could be rerouted or blocked.
  • Encrypted communications might be compromised.
  • Everyday devices could be weaponized to spread fear and propaganda.

The stakes are enormous. Future generations might look back on our era as a time when open communication was a rare privilege—one that, once lost, would be nearly impossible to regain. The solution lies in innovative, decentralized approaches like blockchain-based accountability, which can ensure transparency and empower users to keep the Internet free and open.

The battle for the future of our digital world is here. It’s up to us to expose these vulnerabilities, demand accountability, and fight for an Internet where truth is accessible and free from the control of a few powerful entities.


1 year ago

TLS Security: Only as Strong as the Weakest CA in Your Trust Store

TLS security is only as strong as the weakest CA in your trust store. This blog exposes the hidden risks of the CA trust model, real-world certificate authority failures, and how attackers exploit weak links to break HTTPS security. Learn how to protect yourself with Certificate Transparency, CAA records, and smarter security practices.

The internet runs on trust. Every time you visit a website over HTTPS, your browser is making a critical assumption: that the website you're talking to is actually who it claims to be. But what if that trust is misplaced? What if a trusted Certificate Authority (CA) turns out to be compromised, incompetent, or just plain malicious?

This is the dirty little secret of TLS security—the entire system is only as strong as the weakest CA in your trust store.


How TLS Certificates Work (And Where It Breaks)

When you visit https://google.com, here’s what happens:

  1. Google presents a TLS certificate, issued by a CA (like Let’s Encrypt or DigiCert).

  2. Your browser checks if the CA is trusted (preloaded in its CA trust store).

  3. If the CA is trusted, the connection proceeds securely.

  4. If not, you get a certificate warning (NET::ERR_CERT_AUTHORITY_INVALID).

This system works—until a CA issues a fraudulent certificate.


The CA Model: A Single Point of Failure

Your browser trusts hundreds of CAs by default. If any one of them makes a mistake (or gets compromised), attackers can issue fake certificates for any website.

🚨 Real-World CA Failures

This isn’t just a theoretical issue. It has already happened multiple times:

  1. DigiNotar (2011):

    • Hackers compromised the CA and issued fake Google.com certs.

    • Used in mass surveillance of Iranian users.

    • DigiNotar was removed from all browsers—but the damage was done.

  2. Symantec CA Misuse (2015-2017):

    • Issued unauthorized certificates for Google and other major sites.

    • Google responded by distrusting Symantec completely.

  3. Comodo and WoSign (2016):

    • Issued fraudulent certificates.

    • Google and Mozilla kicked them out of their trust stores.

If a rogue CA issues a cert for google.com, attackers can execute a flawless MITM attack—decrypting traffic and impersonating Google with zero detection.


Defenses Against Rogue CAs

Because we can’t trust CAs blindly, additional security measures exist:

1️⃣ Certificate Transparency (CT)

  • Google requires all CAs to publicly log every issued cert.

  • If DigiCert (or any CA) issues a fake cert for google.com, it will be publicly visible.

  • Google monitors these logs and can catch rogue certs quickly.

2️⃣ Certificate Authority Authorization (CAA)

  • Websites can define which CA is allowed to issue certificates for their domain.

  • If a rogue CA tries to issue a cert for Google without permission, it’s an automatic red flag.

3️⃣ Multi-Path Validation

  • Chrome and Firefox use multiple validation paths to prevent trust in a single CA from being absolute.

4️⃣ Google’s Own CA

  • Google now runs Google Trust Services CA, reducing reliance on third-party CAs.


The Harsh Truth: The CA Model Is Broken

  • Users don’t get to choose which CAs to trust—browser vendors do.

  • A single compromised CA compromises everyone.

  • Attackers don’t need to break ECDHE or RSA—they just need one rogue CA.

TLS is not secure because of encryption alone—it’s secure only if the CA system is trustworthy.


What You Can Do to Protect Yourself

While we can’t overhaul the CA system overnight, there are a few ways to stay safer:

Use browsers that enforce Certificate Transparency (CT).Weakest Link
Check CAA records for your domains if you own a website.
Manually inspect certificates when visiting sensitive sites.
Consider using DNS-based security tools like DNSSEC and DANE.


Final Thoughts

Security is only as strong as its weakest link, and in TLS, that weak link is the CA trust model. The system works—until it doesn’t. And when it fails, it fails catastrophically.

We should question the blind trust we place in CAs and demand better transparency, stronger security policies, and new models that don’t make everyone vulnerable just because one CA screws up.

1 year ago

Why No Tool is Perfect for Website Pen Testing: Balancing Automation and Manual Testing

Discover why no single tool can perfectly assess a website's security. Learn the limitations of automated penetration testing tools, the importance of combining manual testing with automation, and solutions like good recon and ethical hacking methodologies to achieve comprehensive website vulnerability assessments.

Understanding the Nature of Pen Testing Tools

  1. Common Framework, Different Applications
    Most penetration testing tools operate on similar underlying patterns, automating tasks to save time and effort. However, commercial tools often come as packages with specialized plugins designed to detect specific vulnerabilities. Each plugin focuses on a single task, ensuring high accuracy but limiting its scope.

    On the other hand, open-source tools are widely accessible and extensively tested by the community. While they can be powerful, relying solely on open-source tools is not ideal. Open-source solutions may become outdated if not regularly updated, posing challenges for users unfamiliar with evolving technology.

  2. The Diversity and Limitations of Tools
    Different tools excel at different tasks:

    • Some have strong crawlers to map out website structures effectively.
    • Others are optimized for fuzzing or use payloads specific to certain technologies.
    • Some rely on brute force, which, while thorough, can be extremely time-consuming.

    Commercial tools tend to be more user-friendly, making them accessible to less experienced testers. In contrast, open-source tools often require advanced technical knowledge to configure and use effectively.

  3. The Case of Arachni
    Among the open-source tools tested, Arachni stands out as one of the most versatile options. However, its versatility comes with drawbacks. Arachni's broad approach can lead to inefficiency, as it may perform tests like SQL injection scans on pages that are more likely to be vulnerable to XSS attacks. This lack of adaptability can waste time and resources, prompting testers to supplement automated tools with manual techniques.


Solutions for Effective Pen Testing

To overcome the limitations of tools and ensure a comprehensive website assessment:

  1. Prioritize Recon and Fingerprinting
    Transition from black-box testing to white-box testing as much as possible. Good reconnaissance and fingerprinting provide detailed insights into a website’s architecture and vulnerabilities, allowing for more targeted and efficient testing.

  2. Follow the Ethical Hacking Process
    Tools should align with the established steps of ethical hacking—reconnaissance, scanning, exploitation, and reporting. Skipping or improperly executing any step can compromise the quality of the assessment.

  3. Combine Tools for Maximum Coverage
    No single tool can address all vulnerabilities. Use a combination of tools to leverage their unique strengths. For instance, pair tools with strong crawlers with others optimized for payload testing or fuzzing.

  4. Supplement Automation with Manual Testing
    Automated tools are valuable for initial assessments but cannot replace the intuition and adaptability of manual testing. Penetration testers should use tools to handle repetitive tasks while reserving manual efforts for complex vulnerabilities.


Conclusion

While penetration testing tools are essential, no tool is perfect. Each comes with strengths and limitations, and relying on a single solution is not a best practice. The key lies in a balanced approach—leveraging tools effectively while employing manual testing for nuanced assessments. By focusing on thorough recon and following ethical hacking methodologies, testers can ensure more accurate and reliable website security evaluations.

1 year ago