This is from the slightly interesting notebook.
If you check out the
TXT record for
dor.ky you’ll see there is a record
scott$ dig txt dor.ky @sam.ns.cloudflare.com
;; QUESTION SECTION:
;dor.ky. IN TXT
;; ANSWER SECTION:
You can see this firing in action over at http://mxtoolbox.com/SuperTool.aspx?action=txt%3Ador.ky, I’m not picking on them specifically, there were a number of online tools that were vulnerable to this.
I’d be interested to see if you have any more creative ideas on what we can do with this.