• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

News We will talk about DNS tunneling — one of the most dangerous techniques used by bad guys.

dEEpEst

☣☣ In The Depths ☣☣
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Mar 29, 2018
Messages
13,861
Solutions
4
Reputation
27
Reaction score
45,549
Points
1,813
Credits
55,350
‎7 Years of Service‎
 
56%
DNS Tunneling

👋 Welcome to the world of digital security!

Today we will talk about DNS tunneling — one of the most dangerous techniques used by bad guys.

⏺A bit of history: DNS tunneling was first discovered back in 1998. Then Oscar Pearson made a discovery and revealed how DNS can be used for hidden attacks. And in 2004, at the Black Hat conference, it had already become a full-fledged tool for hackers. Since then, this method has been actively used to transfer data, hiding in regular traffic.

⏺How does DNS tunneling work? Let's imagine: there is a hypothetical attacker, and he disguises his not very legal actions as regular legitimate DNS traffic. Such a peculiar spy in a police officer's suit — he looks inconspicuous, but in fact he is up to something bad.

1️⃣The attacker starts by using DNS to hide his actions. And since DNS traffic is almost always allowed and not checked, it can operate freely in such an environment.
2️⃣Next, it tunnels other protocols, such as HTTP, through DNS.
3️⃣Then IP traffic and stolen information are transmitted.
4️⃣After that, the stolen data is converted into a form that is easy to perceive.
5️⃣And, finally, the established tunnels are used to transmit malware.

IMG-20250120-175006-609.jpg
 
Back
Top