{"id":36516,"date":"2020-08-08T07:00:08","date_gmt":"2020-08-08T07:00:08","guid":{"rendered":"http:\/\/39b431e3-1f2d-4da4-95bf-b4b7f4b66f42"},"modified":"2020-08-08T07:00:08","modified_gmt":"2020-08-08T07:00:08","slug":"def-con-new-tool-brings-back-domain-fronting-as-domain-hiding","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding\/","title":{"rendered":"DEF CON: New tool brings back &#8216;domain fronting&#8217; as &#8216;domain hiding&#8217;"},"content":{"rendered":"<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2020\/08\/07\/8817b6b1-41b5-4cbe-b2e7-f5818036413d\/noctilucent.jpg\" class alt=\"noctilucent.jpg\"><\/span><figcaption><span class=\"caption\"><\/span><span class=\"credit\"> Image: Erik Hunstad <\/span><\/figcaption><\/figure>\n<p>At the DEF CON 28 security conference this week, a security researcher has released a new tool that can help the makers of sensitive applications evade censorship and bypass firewalls to keep services up inside problematic areas of the globe.<\/p>\n<p>The new tool, named Noctilucent, was developed by Erik Hunstad, Chief Technical Officer at cyber-security firm SixGen.<\/p>\n<p>According to Hunstad, Noctilucent comes to fill a role left void by cloud providers like <a href=\"https:\/\/www.zdnet.com\/article\/amazons-aws-latest-to-give-up-domain-fronting-putting-censorship-apps-in-peril\/\" target=\"_blank\" rel=\"noopener noreferrer\">Amazon and Google blocking &#8220;domain fronting&#8221;<\/a> on their infrastructure.<\/p>\n<p>Hunstad said he used the new TLS 1.3 protocol to revive domain fronting (sort of) as an anti-censorship technique, but in a new format, the researcher calls &#8220;domain hiding.&#8221;<\/p>\n<h3>What is domain fronting<\/h3>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Domain_fronting\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Domain fronting<\/a> is a technique that has been made popular by mobile app developers in the 2010s and has been used to allow apps to bypass censorship attempts in oppressive countries.<\/p>\n<p>The domain fronting technique allows clients (apps) to connect to a &#8220;front&#8221; domain, which then forwards the connection to the aapp maker&#8217;s real infrastructure.<\/p>\n<p>Countries who want to block an app protected by domain fronting only see the front domain, due to a technicality in how HTTPS connections would be negotiated. See the Wikipedia explanation below:<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\"> <\/section>\n<p><em>&#8220;In a domain-fronted HTTPS request, one domain appears on the &#8220;outside&#8221; of an HTTPS request in plain text-in the DNS request and SNI extention-which will be what the client wants to pretend they are targeting in the connection establishment and is the one that is visible to censors, while a different domain appears on the &#8220;inside&#8221;-in the HTTP Host header, invisible to the censor under HTTPS encryption-which would be the actual target of the connection.&#8221;<\/em><\/p>\n<p>If a country blocks the front domain, an app&#8217;s operators only have to rotate to a new front domain, while keeping their actual and larger infrastructure in the same place &#8212; without having to migrate thousands of servers.<\/p>\n<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding\/\" class=\"lazy\" alt=\"noctilucent-df.png\" height=\"auto\" width=\"1200\" data-original=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/r\/2020\/08\/08\/b9952d9b-d8bf-4f04-b610-89ef2e6289e1\/resize\/1200xauto\/516dca9dd9726d9d534ca95d164ce77e\/noctilucent-df.png\"><\/span><noscript><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/r\/2020\/08\/08\/b9952d9b-d8bf-4f04-b610-89ef2e6289e1\/resize\/1200xauto\/516dca9dd9726d9d534ca95d164ce77e\/noctilucent-df.png\" class alt=\"noctilucent-df.png\" height=\"auto\" width=\"1200\"><\/span><\/noscript><figcaption><span class=\"caption\"><\/span><span class=\"credit\"> Image: Erik Hunstad <\/span><\/figcaption><\/figure>\n<p>Domain fronting still works today, but there are very few hosting providers that allow it. Most companies fear that they might have their entire infrastructure blocked inside a country wanting to block one or more applications.<\/p>\n<p>While some providers still support it, domain fronting died in the spring of 2018, when Amazon and Google dropped support for the technique, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/government\/russia-bans-18-million-amazon-and-google-ips-in-attempt-to-block-telegram\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">under threats from the Russian government<\/a>, which at the time wanted to block access to the Telegram app at any cost.<\/p>\n<p>Telegram found other ways to hide from Russian internet censors, and the Russian government eventually <a href=\"https:\/\/www.zdnet.com\/article\/russia-unbans-telegram\/\" target=\"_blank\" rel=\"noopener noreferrer\">rescinded the ban<\/a>; however, domain fronting was never restored on AWS and Google Cloud &#8212; effectively ending its broad use.<\/p>\n<h3>What is domain hiding<\/h3>\n<p>But since 2018, new technologies have had a chance to grow. TLS 1.3, which was barely a few weeks old in its life as a stable protocol at the time domain fronting was banned, is now widely used across the internet.<\/p>\n<p>Hunstad says that under certain and easy-to-recreate conditions, apps can revive domain fronting with the help of newer technologies, and create new types of &#8220;front&#8221; domains that keep internet censors and firewalls blind to the true destination of a network connection.<\/p>\n<p>&#8220;This new technique, which I&#8217;m calling domain hiding, accomplishes the same goals as domain fronting, but uses different technologies,&#8221; Hunstad said in his DEF CON talk.<\/p>\n<p>The technique is not entirely identical to domain fronting, but is actually much clever because it also tricks firewalls and other network monitoring technologies into thinking the user is accessing another website than the one&#8217;s the app\/user is actually accessing.<\/p>\n<p>For example, in a &#8220;domain hiding&#8221; connection, an app might appear that it&#8217;s initiating an HTTPS connection to firefox.com, but behind the scene, it&#8217;s actually connecting to desired-site.com.<\/p>\n<p>This is possible because the client (app) displays incorrect information in the HTTPS connection&#8217;s plaintext fields, but the connection&#8217;s encrypted fields contain the different information, and the one that&#8217;s honored by servers.<\/p>\n<p><em>TLSHost &#8212; firefox.com (plaintext\/visible)<\/em><br \/><em>SNI &#8212; firefox.com (plaintext\/visible)<\/em><\/p>\n<p><em>HTTP Host header &#8212; desired-site.com (encrypted\/not visible)<\/em><br \/><em>ESNI &#8212; desired-site.com (encrypted\/not visible)<\/em><\/p>\n<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding\/\" class=\"lazy\" alt=\"noctilucent-dh.png\" height=\"auto\" width=\"1200\" data-original=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/r\/2020\/08\/08\/73f19528-2a13-40ad-a845-ef4aee883e7a\/resize\/1200xauto\/7e5d677344a364996b1f0979a486391e\/noctilucent-dh.png\"><\/span><noscript><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/r\/2020\/08\/08\/73f19528-2a13-40ad-a845-ef4aee883e7a\/resize\/1200xauto\/7e5d677344a364996b1f0979a486391e\/noctilucent-dh.png\" class alt=\"noctilucent-dh.png\" height=\"auto\" width=\"1200\"><\/span><\/noscript><figcaption><span class=\"caption\"><\/span><span class=\"credit\"> Image: Erik Hunstad <\/span><\/figcaption><\/figure>\n<p>Hunstad&#8217;s new Noctilucent tool, <a href=\"https:\/\/github.com\/SixGenInc\/Noctilucent\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">open-sourced on GitHub this week<\/a>, automates the process of hiding domains with the researcher&#8217;s new technique.<\/p>\n<p>The tool was built to use Cloudflare as a host for &#8220;front&#8221; domains.<\/p>\n<p>To use Noctilucent, Hunstad says apps have to support TLS 1.3 when initiating HTTPS connections, and also have to have their domain DNS records managed via Cloudflare (as the true domain is hidden among other Cloudflare-hosted domains).<\/p>\n<p>Hunstad says domain hiding has advantages when compared to domain fronting. The biggest is that apps don&#8217;t have to host all their infrastructure on the same provider as they had to do with the older domain fronting technique.<\/p>\n<p>Domain hiding now allows to host their domain DNS records on Cloudflare, but host their actual servers anywhere and with any hosting provider they want.<\/p>\n<p>However, just like most tools, Noctilucent has its good and bad sides. While the tool can help apps set up a new form of domain fronting and avoid censorship, it can also be useful in hiding malware command-and-control servers as well &#8212; something that some security researchers might need to take note for future incident response investigations.<\/p>\n<p>Additional technical details are available in Noctilucent&#8217;s GitHub repo and Hunstad&#8217;s DEF CON talk below.<\/p>\n<section class=\"shortcode media-source\">\n<p> <iframe width=\"500\" height=\"282\" frameborder=\"0\" allowfullscreen=\"true\" title=\"YouTube content\" id=\"iframe_youtube\" class=\"optanon-category-3\" data-src=\"https:\/\/www.youtube.com\/embed\/TDg092qe50g\">[embedded content]<\/iframe> <\/p>\n<\/section>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>After Amazon and Google stopped supporting the censorship-evading domain fronting technique on their clouds in 2018, new Noctilucent toolkit aims to bring it back in a new form as &#8220;domain hiding.&#8221;<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":36517,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-36516","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DEF CON: New tool brings back &#039;domain fronting&#039; as &#039;domain hiding&#039; 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DEF CON: New tool brings back &#039;domain fronting&#039; as &#039;domain hiding&#039; 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-08T07:00:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"DEF CON: New tool brings back &#8216;domain fronting&#8217; as &#8216;domain hiding&#8217;\",\"datePublished\":\"2020-08-08T07:00:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding\\\/\"},\"wordCount\":911,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding\\\/\",\"name\":\"DEF CON: New tool brings back 'domain fronting' as 'domain hiding' 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding.jpg\",\"datePublished\":\"2020-08-08T07:00:08+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding.jpg\",\"width\":1000,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DEF CON: New tool brings back &#8216;domain fronting&#8217; as &#8216;domain hiding&#8217;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DEF CON: New tool brings back 'domain fronting' as 'domain hiding' 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding\/","og_locale":"en_US","og_type":"article","og_title":"DEF CON: New tool brings back 'domain fronting' as 'domain hiding' 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-08-08T07:00:08+00:00","og_image":[{"width":1000,"height":500,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"DEF CON: New tool brings back &#8216;domain fronting&#8217; as &#8216;domain hiding&#8217;","datePublished":"2020-08-08T07:00:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding\/"},"wordCount":911,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding\/","url":"https:\/\/www.threatshub.org\/blog\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding\/","name":"DEF CON: New tool brings back 'domain fronting' as 'domain hiding' 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding.jpg","datePublished":"2020-08-08T07:00:08+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding.jpg","width":1000,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"DEF CON: New tool brings back &#8216;domain fronting&#8217; as &#8216;domain hiding&#8217;"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36516","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=36516"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36516\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/36517"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=36516"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=36516"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=36516"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}