Learn the basics of DNS exfiltration in this video.
- [Instructor] DNS has been used…in a number of attacks to exfiltrate data.…It's been popular because access…to an internet-based DNS server is a common requirement,…and so the exfiltration channel doesn't need to be set up.…In addition, at least before this channel became well known,…no one bothered looking at DNS traffic.…DNS is a fundamental component of the Internet Protocol…and its main purpose is to translate hostnames…to IP addresses.…
DNS was from the beginning designed…as a distributed database where resolution…at each level of a hostname corresponds to a single server…known as the authoritive name server…within the distributed DNS database.…When a hostname is sent for resolution, the DNS client…searches for the correct authoritive name server.…Once reached, it replies with an IP address…corresponding to the appropriate hostname.…DNS is an excellent covert channel because misconfiguration…of the DNS can lead to network disconnects.…
Security policies restricting its use are rarely applied.…Even now that it's a known threat,…
- How tunneling works
- Running a local SSH tunnel
- Dynamic SSH tunneling
- Pivoting with Armitage and Metaspoit
- Exfiltrating using DET and DNS
- Covert exfiltration with Cachetalk
- Using PyExfil to exfiltrate over HTTPS
Skill Level Advanced
Ethical Hacking: Penetration Testingwith Lisa Bock1h 20m Intermediate
Penetration Testing Essential Trainingwith Malcolm Shore2h 29m Intermediate
Penetration Testing: Advanced Kali Linuxwith Malcolm Shore2h 22m Intermediate
1. Preparing the Lab
Next steps1m 38s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.