Common Information
Type Value
Value
DNS Server - T1584.002
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may compromise third-party DNS servers that can be used during targeting. During post-compromise activity, adversaries may utilize DNS traffic for various tasks, including for Command and Control (ex: [Application Layer Protocol](https://attack.mitre.org/techniques/T1071)). Instead of setting up their own DNS servers, adversaries may compromise third-party DNS servers in support of operations. By compromising DNS servers, adversaries can alter DNS records. Such control can allow for redirection of an organization's traffic, facilitating Collection and Credential Access efforts for the adversary.(Citation: Talos DNSpionage Nov 2018)(Citation: FireEye DNS Hijack 2019) Additionally, adversaries may leverage such control in conjunction with [Digital Certificates](https://attack.mitre.org/techniques/T1588/004) to redirect traffic to adversary-controlled infrastructure, mimicking normal trusted network communications.(Citation: FireEye DNS Hijack 2019)(Citation: Crowdstrike DNS Hijack 2019) Adversaries may also be able to silently create subdomains pointed at malicious servers without tipping off the actual owner of the DNS server.(Citation: CiscoAngler)(Citation: Proofpoint Domain Shadowing)
Details Published Attributes CTI Title
Details Website 2024-11-30 4 Exploiting Vulnerabilities in a TLD Registrar to Takeover Tether, Google, and Amazon — Palisade
Details Website 2024-11-16 0 Mastering Recon for Bug Hunters, Part 4: Advanced Strategies & Real-World Examples
Details Website 2024-11-15 1 What is DNS? The Backbone of the Internet Explained
Details Website 2024-11-15 8 Sharing is Caring: BestieLoader Malware Analysis
Details Website 2024-11-14 7 HTB Academy — Footprinting — Skills Assessment 1
Details Website 2024-11-12 7 10 Best DNS Management Tools - 2025
Details Website 2024-11-09 1 Choosing the Best DNS Server: Speed, Privacy, and Customization Compared
Details Website 2024-11-09 18 BugBounty — Mastering the Basics (along with Resources)[Part-3]
Details Website 2024-11-08 6 HawkEye Cyberdefenders Walkthough Solution
Details Website 2024-11-08 1 How to secure a DNS server?
Details Website 2024-11-05 12 Lab Writeup: PSExec Hunt
Details Website 2024-11-04 13 Lab Writeup: Hawkeye
Details Website 2024-11-01 1 Understanding The Role Of DNS In Advanced VPN Security
Details Website 2024-10-31 69 Comprehensive Bug Bounty Hunting Methodology (2024 Edition)
Details Website 2024-10-31 3 Understanding DNS MX Records and Their Role in Email Security
Details Website 2024-10-30 1 JavaScript Security Vulnerabilities Unveiled: Insights from Sandworm Monitor
Details Website 2024-10-30 7 Opera Browser Fixes Big Security Hole That Could Have Exposed Your Information
Details Website 2024-10-30 7 Opera Browser Fixes Big Security Hole That Could Have Exposed Your Information - RedPacket Security
Details Website 2024-10-30 12 “CrossBarking” — Exploiting a 0-Day Opera Vulnerability with a Cross-Browser Extension Store Attack
Details Website 2024-10-29 7 How To Test The Security Of Your Advanced VPN
Details Website 2024-10-29 1 Malware Defense By Blocking Malicious Websites
Details Website 2024-10-26 21 Analyzing the Wannacry Ransomware
Details Website 2024-10-26 18 AIO Web App Pentesting Checklist
Details Website 2024-10-24 0 How to Set Up a Linux DNS Server with BIND
Details Website 2024-10-24 3 SSH keys