DNS  MANIPULATION



              Adarsh ds cybersecuriyt

 In this room, we will look into DNS and showcase the techniques used to exfiltrate and infiltrate data. First, we will look at what purposes DNS serves, how it works, and the types of DNS records.

The image below illustrates a basic DNS lookup. Here the client machine reaches out to a DNS server to resolve a Fully Qualified Domain Name (FQDN) to an IP address.


We will then move to how DNS is being used as a "Data Exfiltration" and "Data Infiltration" tool via DNS queries.


And finally, we will look at DNS Tunneling and how it is used to 'tunnel' different protocols like (HTTP) through DNS.



Adarsh ds cybersecuriyt


Comments

Popular Posts