dnscat2: Command and Control over the DNS

dnscat2: Command and Control over the DNS

In this article, we learn DNS tunnelling through an amazing tool i.e. DNScat2

Table of Content :

  • Introduction to DNS
  • Introduction to DNScat
  • Installation
  • DNS tunnelling
  • Conclusion

Introduction to DNS

The Domain Name System (DNS) associate’s URLs with their IP address. With DNS, it’s conceivable to type words rather than a series of numbers into a browser, enabling individuals to look for sites and send messages utilizing commonplace names. When you look for the domain name in a browser, it sends a question over to the DNS server to coordinate the domain with its IP. When found, it utilizes the IP to recover the site’s content. Most astonishingly, this entire procedure takes just milliseconds. For all this working, it uses port 53.

Introduction to DNScat

DNScat is such praised tool because it can create a command and control tunnel over the DNS protocol which lets an attacker work in stealth mode. You can access any data along with uploading and downloading files and to get a shell. For this tool to work over 53 port, you don’t need to have authoritative access to DNS server, you can just simply establish your connection over port 53 and it will be faster and it will still be sensed as usual traffic. But it makes its presence well known in the packet log.

FUll Article Read Here

CA Jatin Aggarwal

CA | 19+ Yrs | Driving Growth for 300+ Startups with Expert Financial, Tax & Compliance Solutions

1 周

??

回复
Rapha?l de la Vienne

Founder & CTO - ReConfirm | Effortlessly Secure

5 年
Rafael Novaes

Deployment Specialist/Team Leader @ Skyone | Multicloud, Devops, Security

5 年
回复
Rafael Novaes

Deployment Specialist/Team Leader @ Skyone | Multicloud, Devops, Security

5 年
回复
AUSites- Charles Domanico

AUSites Cyber Solutions Linux RHCSA?CNA?CyberSecurity? IEEE ?SyS Admin?NCSA Vulnerability Research?Penetration Testing?Independent Consultant*

5 年

Nice tool? ..

回复

要查看或添加评论,请登录

Rajpal Singh的更多文章

  • Born2Root: 2: Vulnhub Walkthrough

    Born2Root: 2: Vulnhub Walkthrough

    Hello Friends!! Today we are going to take another CTF challenge named “Born2Root: 2”. The credit for making this VM…

    1 条评论
  • HackInOS:1: Vulnhub Lab Walkthrough

    HackInOS:1: Vulnhub Lab Walkthrough

    Hello friends! Today we are going to take another boot2root challenge known as “HackInOS: 1”. The credit for making…

    2 条评论
  • unknowndevice64: 1: Vulnhub Lab Walkthrough

    unknowndevice64: 1: Vulnhub Lab Walkthrough

    Hello friends! Today we are going to take another boot2root challenge known as “unknowndevice64: 1”. The credit for…

  • Hack the Box Access: Walkthrough

    Hack the Box Access: Walkthrough

    Today we are going to solve another CTF challenge “Access”. It is a retired vulnerable lab presented by Hack the Box…

    2 条评论
  • Vulnhub: RootThis: 1 Walkthrough

    Vulnhub: RootThis: 1 Walkthrough

    Hello friends! Today we are going to take another boot2root challenge known as root this. The credit for making this VM…

  • Vulnhub: Kuya: 1 Walkthrough

    Vulnhub: Kuya: 1 Walkthrough

    Today we are going to solve another CTF challenge “Kuya”. It is another vulnerable lab presented by vulnhub for helping…

  • Matrix 2: Vulnhub Lab Walkthrough

    Matrix 2: Vulnhub Lab Walkthrough

    Today we are going to solve another Boot2Root challenge “Matrix 2”. It is another vulnerable lab presented by vulnhub…

    1 条评论
  • W34kn3ss 1: Vulnhub Lab Walkthrough

    W34kn3ss 1: Vulnhub Lab Walkthrough

    Today we are going to solve another CTF challenge “W34kn3ss 1”. Briefing about the lab, the matrix is controlling this…

  • Pentest Lab Setup on Memcached

    Pentest Lab Setup on Memcached

    In this article, we are going to learn about pen-testing in Memcached lab setup in Ubuntu 18.04.

  • Exploiting Windows PC using Malicious Contact VCF file

    Exploiting Windows PC using Malicious Contact VCF file

    A huge shoutout to cyber security researcher John Page for bringing this vulnerability into the internet’s eye on…

社区洞察

其他会员也浏览了