Command and Control & Tunnelling via DNS
infosecwriteups.com·6h
🌐DNS Security
Preview
Report Post

An attacker has compromised a server. They try to connect out, but every port is blocked by a restrictive firewall…

Except one: Port 53 (DNS).

For most networks, DNS is the one protocol that is always allowed out. Attackers know this, and they exploit it.

By “tunneling” their Command & Control (C2) traffic inside normal-looking DNS queries, they can remain completely hidden. This is a classic Advanced Persistent Threat (APT) technique.

In this guide, we’ll do a full end-to-end exercise. First, we’ll put on our Red Team hat and use dnscat2 to perform the DNS tunneling attack. Then, we'll switch to the Blue Team, ingest our logs into a SIEM, and write the exact queries to hunt for...

Similar Posts

Loading similar posts...