DNS
Tunneling
iodined -b 47110-f 10.0.0.1 tunnel.test.com
iodine -f -r <server-IP> tunnel.test.com
NS
record of the owned domain should contain the subdomain, e.g. tunnel.test.com
- Client gets a tunnel IP in the range of
10.0.0.0/8
- Check connection via
- Generate ssh-key and put in on the server
- Dynamic port forwarding to server via
ssh <user>@10.0.0.1 -D 8080
- User proxy server on the client's web server like
--proxy-server
or use a SOCKS proxy like FoxyProxy
nslookup
nslookup type=txt <domain>
Reverse lookup
- Stored inside
PTR
record
- Reverse IP may look like
<IP>.in-addr.arpa.
, but not via drill
or dig
Exfiltration
- Add data to UDP DNS requests
- Capture traffic on an owned DNS server
253
is the max length of a DNS name
- Encode the payload to hide it
Infiltration
- Inside
TXT
or any other possible records
Social_engineering