Common Information
Type Value
Value
DNS Server - T1583.002
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may set up their own Domain Name System (DNS) servers that can be used during targeting. During post-compromise activity, adversaries may utilize DNS traffic for various tasks, including for Command and Control (ex: [Application Layer Protocol](https://attack.mitre.org/techniques/T1071)). Instead of hijacking existing DNS servers, adversaries may opt to configure and run their own DNS servers in support of operations. By running their own DNS servers, adversaries can have more control over how they administer server-side DNS C2 traffic ([DNS](https://attack.mitre.org/techniques/T1071/004)). With control over a DNS server, adversaries can configure DNS applications to provide conditional responses to malware and, generally, have more flexibility in the structure of the DNS-based C2 channel.(Citation: Unit42 DNS Mar 2019)
Details Published Attributes CTI Title
Details Website 2024-11-30 4 Exploiting Vulnerabilities in a TLD Registrar to Takeover Tether, Google, and Amazon — Palisade
Details Website 2024-11-16 0 Mastering Recon for Bug Hunters, Part 4: Advanced Strategies & Real-World Examples
Details Website 2024-11-15 1 What is DNS? The Backbone of the Internet Explained
Details Website 2024-11-15 8 Sharing is Caring: BestieLoader Malware Analysis
Details Website 2024-11-14 7 HTB Academy — Footprinting — Skills Assessment 1
Details Website 2024-11-12 7 10 Best DNS Management Tools - 2025
Details Website 2024-11-09 1 Choosing the Best DNS Server: Speed, Privacy, and Customization Compared
Details Website 2024-11-09 18 BugBounty — Mastering the Basics (along with Resources)[Part-3]
Details Website 2024-11-08 6 HawkEye Cyberdefenders Walkthough Solution
Details Website 2024-11-08 1 How to secure a DNS server?
Details Website 2024-11-05 12 Lab Writeup: PSExec Hunt
Details Website 2024-11-04 13 Lab Writeup: Hawkeye
Details Website 2024-11-01 1 Understanding The Role Of DNS In Advanced VPN Security
Details Website 2024-10-31 69 Comprehensive Bug Bounty Hunting Methodology (2024 Edition)
Details Website 2024-10-31 3 Understanding DNS MX Records and Their Role in Email Security
Details Website 2024-10-30 1 JavaScript Security Vulnerabilities Unveiled: Insights from Sandworm Monitor
Details Website 2024-10-30 7 Opera Browser Fixes Big Security Hole That Could Have Exposed Your Information
Details Website 2024-10-30 7 Opera Browser Fixes Big Security Hole That Could Have Exposed Your Information - RedPacket Security
Details Website 2024-10-30 12 “CrossBarking” — Exploiting a 0-Day Opera Vulnerability with a Cross-Browser Extension Store Attack
Details Website 2024-10-29 7 How To Test The Security Of Your Advanced VPN
Details Website 2024-10-29 1 Malware Defense By Blocking Malicious Websites
Details Website 2024-10-26 21 Analyzing the Wannacry Ransomware
Details Website 2024-10-26 18 AIO Web App Pentesting Checklist
Details Website 2024-10-24 0 How to Set Up a Linux DNS Server with BIND
Details Website 2024-10-24 3 SSH keys