top of page

1. Enumerate subdomains via Certificate Transparency

  • Writer: Patrick Duggan
    Patrick Duggan
  • Oct 23, 2025
  • 6 min read

title: "I Found Hidden C&C Infrastructure in a 'Proxy Detection' Service"

date: 2025-10-24

author: Patrick Duggan

category: Security Operations

excerpt: After receiving a sales pitch from a convicted DDoS operator, I analyzed his "proxy detection" service. Found 3 hidden backend subdomains, WebSocket bypassing Cloudflare, and infrastructure that looks exactly like what residential proxy operators use. Here's the full technical breakdown.



**TL;DR:** A proxy detection service using proxy evasion techniques.




Context



Yesterday I published: ["I Caught the Guy Who Attacked Brian Krebs. He's Selling the Solution Now."](https://www.dugganusa.com/post/i-caught-the-guy-who-attacked-brian-krebs-he-s-selling-the-solution-now)


Someone scraped my site using residential proxies. I published the threat intelligence report. He emailed me the same day to sell his proxy detection service.


**Today:** I analyzed his infrastructure.


**What I found:** Classic C&C architecture hidden in plain sight.




Discovery Method: Certificate Transparency Logs



Certificate Transparency is public. Anyone can query it.





**Results:**





Three hidden backend subdomains. Let's test them.




queue.layer3intel.com - The Job Queue






**Finding:** Active endpoint requiring Bearer authentication.


**Question:** Why does a "proxy detection service" need a job queue with Bearer auth?


**Possible answers:**

1. **Legitimate:** Customer analytics, audit logging, service monitoring

2. **Suspicious:** C&C job tasking, data collection aggregation

3. **Very suspicious:** Command & control endpoint for distributed operations


I don't know which. I just know it's there, it's hidden from docs, and it requires authentication.




The WebSocket Pattern



From analyzing `tripwire.min.js` (their CDN-distributed code):


Architecture Flow:






**Key finding:** The core detection functionality connects DIRECTLY to OVH server, bypassing Cloudflare CDN.


**Why this matters:** Cloudflare can't log WebSocket traffic it doesn't see.




The Irony: Proxy Evasion Techniques



Let me show you what residential proxy operators do to avoid detection:


**Residential Proxy Operator Playbook:**

- ✓ Bypass CDN logging (use direct IP connections)

- ✓ Use WebSocket (harder to inspect than HTTPS)

- ✓ Hide backend infrastructure (minimize exposure)

- ✓ Use budget VPS (OVH, not AWS/Azure/GCP)

- ✓ Minify code without source maps (obfuscation)

- ✓ Keep source code private (no GitHub repo)


**What Layer3 Tripwire Does:**

- ✅ Bypasses Cloudflare CDN (WebSocket → OVH directly)

- ✅ Hides backend subdomains (queue, chronicle, spectacle)

- ✅ Uses budget VPS (OVH US LLC @ 135.148.137.76)

- ✅ Minified code, no source maps

- ✅ No GitHub repository (100% proprietary)

- ✅ Private source code (minified JavaScript only)


**A proxy detection service using the same operational security as proxy operators.**




OWASP Analysis



A01:2021 – Broken Access Control



**Finding:** `queue.layer3intel.com` exposed with HTTP 401


**Risk:**

- Backend endpoint enumerable via Certificate Transparency

- Bearer auth reveals architecture to attackers

- Can attempt token brute force (no visible rate limiting)




A05:2021 – Security Misconfiguration



**Finding:** Hidden subdomains revealed via Certificate Transparency logs


**Impact:**

- `queue.layer3intel.com` - job queue endpoint

- `chronicle.layer3intel.com` - data logging endpoint?

- `spectacle.layer3intel.com` - admin dashboard?


**Recommendation:** Separate internal/external DNS, use wildcard certs strategically




A09:2021 – Security Logging and Monitoring Failures



**Finding:** WebSocket bypasses Cloudflare CDN


**Impact:**

- Cloudflare Analytics shows JavaScript delivery from CDN

- Cloudflare Analytics CANNOT see WebSocket traffic to OVH

- No CDN access logs for actual proxy detection traffic


**The irony:** A proxy detection service avoiding detection by its own CDN provider.




Infrastructure Comparison: DugganUSA vs Layer3 Intel



I audited my own infrastructure to make sure I'm not doing the same thing.


Certificate Transparency Check (dugganusa.com):






Hidden Backend Endpoints?






**No 401 Bearer auth endpoints. No hidden job queues. No WebSocket C&C.**


GitHub Repository?



✅ **Public:** https://github.com/pduggusa/enterprise-extraction-platform

- Full source code (microservices, scripts, patterns)

- CLAUDE.md architecture documentation

- Infrastructure costs documented ($77/month)

- All subdomains explained


WebSocket Usage?






**We're clean.**




The Transparency Scorecard



| Metric | DugganUSA | Layer3 Intel |

|--------|-----------|--------------|

| **GitHub Repository** | ✅ Public | ❌ None |

| **Source Code** | ✅ Available | ❌ Minified only |

| **Hidden Subdomains** | ⚠️ 1 legacy (explained) | 🚨 3 active (unexplained) |

| **WebSocket Usage** | ✅ None | 🚨 Yes (bypasses CDN) |

| **Hidden Auth Endpoints** | ✅ None | 🚨 queue.layer3intel.com |

| **CDN Bypass** | ✅ All traffic logged | 🚨 WebSocket bypasses |

| **Infrastructure Costs** | ✅ Documented ($77/month) | ❌ Unknown (~$50-90/month) |




Flow Diagrams



What They Show You (Public Documentation):






Simple, right?


What's Actually Happening (What We Found):








The Attack Chain



**STEP 1: Initial Load**

- User visits site with Tripwire integration

- Browser requests: `https://cdn.layer3intel.com/tripwire.min.js`

- Cloudflare CDN serves minified JavaScript


**STEP 2: WebSocket C&C Connection**

- `tripwire.min.js` opens WebSocket: `wss://tripwire.layer3intel.com/ws`

- Connection bypasses Cloudflare (direct to OVH 135.148.137.76)

- Encrypted WSS tunnel established


**STEP 3: Challenge/Response**

- Server → Client: `"1234"` (random number)

- Client → Server: `"1235"` (number + 1)

- Server validates math


**STEP 4: Token Generation**

- Server → Client: JWT token

- Token contains: proxy detection result + fingerprinting data?

- JavaScript fires event: `tripwire:success`


**STEP 5: Backend Communication (Hypothesis)**

- Backend sends data to `queue.layer3intel.com` (job queue)

- Data logged in `chronicle.layer3intel.com` (database?)

- Admin monitors via `spectacle.layer3intel.com` (dashboard?)




My Questions



**To Layer3 Intel:**


1. **What is queue.layer3intel.com for?**

Why does proxy detection need a Bearer-authenticated job queue?


2. **Why bypass Cloudflare for WebSocket?**

Performance? Or hiding traffic from CDN logs?


3. **What are chronicle and spectacle subdomains?**

They have SSL certificates but no DNS records.


4. **Why no GitHub repository?**

Kevin Mitnick published tools post-prison. Transparency = credibility.


5. **Why minified code with no source maps?**

Most legitimate JavaScript security libraries publish source.


**I'm genuinely asking.** If there are legitimate explanations, I'll update this post.




My Answer



**Will I integrate Layer3 Tripwire?**


No.


**Why?**


Because when I analyze security infrastructure, I want to see:

- ✅ Public source code (GitHub repo)

- ✅ Documented architecture (all subdomains explained)

- ✅ Transparent operations (no hidden auth endpoints)

- ✅ CDN logging (all traffic visible)


**What I found instead:**

- ❌ No GitHub repository

- ❌ 3 hidden backend subdomains (discovered via Certificate Transparency)

- ❌ Bearer-authenticated job queue (unexplained)

- ❌ WebSocket bypassing CDN (hiding from logs)


**Legitimate explanation:** Standard SaaS backend architecture (analytics, logging, monitoring)


**Suspicious explanation:** C&C infrastructure for data collection/tasking


**I don't know which it is.** I just know it's there, it's hidden, and it uses the same techniques as the adversaries it claims to detect.




Pattern #21: Infrastructure Transparency Auditing



**New pattern documented.**


When someone sells you security services, audit their infrastructure first:


1. ✅ Check Certificate Transparency logs (crt.sh)

2. ✅ Enumerate all subdomains (public + hidden)

3. ✅ Test hidden endpoints (auth requirements, status codes)

4. ✅ Check for WebSocket usage (C&C patterns)

5. ✅ Look for CDN bypass (hiding from logs)

6. ✅ Search for GitHub repository (source code)

7. ✅ Compare findings to public docs

8. ✅ Document everything (radical transparency)


**Result:** You'll know if their infrastructure matches their marketing.




What Happens Next



**If this analysis is wrong:**

Sergiy (or anyone from Layer3 Intel) can email me: [email protected]


I'll publish your explanation. I'll update this post. Radical transparency cuts both ways.


**If this analysis is right:**

The timing speaks for itself:

- Oct 15-16: Someone scrapes my site (residential proxies)

- Oct 23: I publish threat intel report

- Oct 23 (same day): He emails to sell proxy detection

- Oct 24: I find hidden C&C infrastructure


**Pattern #19 (Honeytrap via Radical Transparency) keeps delivering.**




Evidence Repository



All evidence is public: https://github.com/pduggusa/enterprise-extraction-platform


**Files:**

- `compliance/evidence/threat-intelligence/layer3-tripwire-c2-infrastructure-analysis-oct-24-2025.md` (15,000 words)

- `compliance/evidence/threat-intelligence/layer3-tripwire-dns-investigation-oct-23-2025.md` (10,000 words)

- `compliance/evidence/dugganusa-vs-layer3-infrastructure-comparison.md` (8,000 words)

- `compliance/evidence/threat-intelligence/canada-residential-proxy-scraping-oct-2025.md` (11,000 words)


**Total documentation:** 44,000 words with full receipts.




Reproducible Commands



**All findings are reproducible. Here are the exact commands:**





**Run them yourself. Verify my findings.**




To Readers



**If you're hiring security vendors:**

- Check Certificate Transparency for hidden subdomains

- Test for unexplained auth endpoints

- Look for WebSocket bypass patterns

- Ask for GitHub repositories

- Verify infrastructure matches marketing


**If you're building security services:**

- Document ALL subdomains (even backend ones)

- Don't hide infrastructure from your own CDN

- Publish source code when possible

- Explain authentication endpoints in docs

- Transparency = credibility


**If you're a security researcher:**

- Certificate Transparency is public data

- OSINT is legal (no hacking required)

- Document everything you find

- Publish with epistemic humility (could be wrong)

- Invite corrections (radical transparency)




The Bottom Line



I caught someone scraping my site.


They emailed me to sell proxy detection.


I analyzed their infrastructure.


**Found:** Hidden subdomains, WebSocket bypassing CDN, Bearer-authenticated job queue, no GitHub repo.


**Looks like:** C&C infrastructure for residential proxy operations.


**Could be:** Legitimate SaaS backend architecture.


**I don't know which.** I just documented what I found.


**This is what we do for $0 budget.**

Imagine what we can do with a real one.




**P.S. - If you want to verify I'm not doing the same thing:**


My infrastructure audit is public: `compliance/evidence/dugganusa-vs-layer3-infrastructure-comparison.md`


**Findings:**

- ✅ No hidden auth endpoints

- ✅ No WebSocket usage

- ✅ All subdomains documented (even the one I forgot about)

- ✅ Full source code on GitHub

- ✅ Infrastructure costs published ($77/month)


**We're clean.**




**Update Log:**

- **Oct 24, 2025 00:15 UTC:** Initial publication

- **Awaiting:** Response from Layer3 Intel (if any)

- **Will update:** With any legitimate explanations provided


**Radical transparency = publish findings + publish corrections.**




**Related Posts:**

- [I Caught the Guy Who Attacked Brian Krebs](https://www.dugganusa.com/post/i-caught-the-guy-who-attacked-brian-krebs-he-s-selling-the-solution-now)

- Pattern #19: Honeytrap via Radical Transparency

- Pattern #21: Infrastructure Transparency Auditing (new)


 
 
 

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page