Common Information
Type Value
Value
DNS Server - T1583.002
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may set up their own Domain Name System (DNS) servers that can be used during targeting. During post-compromise activity, adversaries may utilize DNS traffic for various tasks, including for Command and Control (ex: [Application Layer Protocol](https://attack.mitre.org/techniques/T1071)). Instead of hijacking existing DNS servers, adversaries may opt to configure and run their own DNS servers in support of operations. By running their own DNS servers, adversaries can have more control over how they administer server-side DNS C2 traffic ([DNS](https://attack.mitre.org/techniques/T1071/004)). With control over a DNS server, adversaries can configure DNS applications to provide conditional responses to malware and, generally, have more flexibility in the structure of the DNS-based C2 channel.(Citation: Unit42 DNS Mar 2019)
Details Published Attributes CTI Title
Details Website 2024-09-12 2 Encrypted DNS: DoT, DoH, and DoQ
Details Website 2024-09-12 6 Active Directory Setup Guide: Installation and Configuration
Details Website 2024-09-12 14 How to Set Up Your Own VPN on AWS: A Comprehensive Guide
Details Website 2024-09-11 4 Linux üzərində DNS Server quraşdırılması və ayarlanması
Details Website 2024-09-10 10 An In-Depth Look at DNS
Details Website 2024-09-10 2 Private IP Address vs MAC Address in a Local Area Network??
Details Website 2024-09-10 8 What is subdomain takeover? How it is done and its consequences & Subzy tool
Details Website 2024-09-08 2 What happens when you enter a URL
Details Website 2024-09-06 35 HackTheBox Sherlock Writeup: APTNightmare
Details Website 2024-09-06 0 SMT2024 Special Lecture 2: Cyber Threat Intelligence by NSHC
Details Website 2024-09-06 0 Filtering Bot Traffic In Dnschef
Details Website 2024-09-05 0 Understanding mDNS and Its Security Loopholes
Details Website 2024-09-03 5 DNS zone transfer attack
Details Website 2024-09-02 7 HTB SHERLOCK : NOTORIOUS WALKTHROUGH
Details Website 2024-09-02 43 Creating a DNS C2 server and agent
Details Website 2024-09-02 2 How SSL Certificates Can Help Prevent Man-in-the-Middle Attacks
Details Website 2024-09-01 5 Reconnaissance: The Defensive Team
Details Website 2024-09-01 3 E-RANK Dungeon: Passive Reconnaissance
Details Website 2024-08-31 64 Case: Certification-DNS Cache
Details Website 2024-08-31 19 Passive Reconnaissance in TryHackMe
Details Website 2024-08-30 16 Internet Storm Center Diary 2024-08-30 - SANS Internet Storm Center
Details Website 2024-08-30 16 Simulating Traffic With Scapy - SANS Internet Storm Center
Details Website 2024-08-28 1 Breaking Badness Cybersecurity Podcast - 192. TLD-fense
Details Website 2024-08-23 13 Local Networks Go Global When Domain Names Collide – Krebs on Security
Details Website 2024-08-18 21 LAPSUS$ is dead, long live HexaLocker?