Common Information
Type Value
Value
DNS - T1071.004
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may communicate using the Domain Name System (DNS) application layer protocol to avoid detection/network filtering by blending in with existing traffic. Commands to the remote system, and often the results of those commands, will be embedded within the protocol traffic between the client and server. The DNS protocol serves an administrative function in computer networking and thus may be very common in environments. DNS traffic may also be allowed even before network authentication is completed. DNS packets contain many fields and headers in which data can be concealed. Often known as DNS tunneling, adversaries may abuse DNS to communicate with systems under their control within a victim network while also mimicking normal, expected traffic.(Citation: PAN DNS Tunneling)(Citation: Medium DnsTunneling)
Details Published Attributes CTI Title
Details Website 2011-07-13 0 Binary C&C Over HTTP
Details Website 2011-07-06 1015 Hacker Media and Pentesting List
Details Website 2011-07-02 0 TRAINING: Python For Hackers
Details Website 2011-06-27 4 MS11-030: Exploitable or Not? | Rapid7 Blog
Details Website 2011-06-20 60 Apr 13 CVE-2011-2100 PDF - Adobe DLL Loading Vulnerability - Agenda.7z
Details Website 2011-06-18 0 Talk: Attack UPnP โ€“ The Useful plug and pwn protocols
Details Website 2011-06-17 9 Intercepting Blackberry Application Traffic
Details Website 2011-06-07 0 Defend Online Anonymity โ€“ Set Up a Tor Relay | dc414
Details Website 2011-06-05 18 Netgear FVS318 einrichten & Geschwindigkeitstest
Details Website 2011-06-02 0 vSploit - Virtualizing Intrusion & Exploitation Attributes with Metasploit Framework | Rapid7 Blog
Details Website 2011-06-01 161 Tor security advisory: "relay early" traffic confirmation attack | Tor Project
Details Website 2011-05-31 60 May 17 CVE-2010-2883 PDF Bin Laden's successor from spoofed Nationalpost.com
Details Website 2011-05-16 66 Dumping Hashes on Win2k8 R2 x64 with Metasploit :: malicious.link โ€” welcome
Details Website 2011-05-05 13 Setting up Cerberus RAT(Remote Administration tool)
Details Website 2011-04-20 38 Apr 16 CVE-2011-0611 DOC urgent files from 97.66.14.11
Details Website 2011-04-17 1 dnsmap-bulk
Details Website 2011-04-13 43 Bold FBI Move Shutters COREFLOOD Bot
Details Website 2011-03-28 20 Mar 25-28 CVE-2009-3129 XLS LES Request or Lybia Crisis from bran343@yahoo.com
Details Website 2011-03-24 0 Virus Bulletin :: Rogue SSL certificates issued for popular websites
Details Website 2011-03-09 3 At least, I got DoS ยท The Recurity Lablog
Details Website 2011-02-28 0 27c3 - 27th Chaos Communication Congress in Berlin (2010-12-27 to 2010-12-30)
Details Website 2011-02-23 0 Checking for infections with the Bohu trojan
Details Website 2011-02-07 163 Vulnerability Summary for the Week of January 31, 2011 | CISA
Details Website 2011-01-24 32 Jan 24 CVE-2010-3970 DOC 'Secretary-General Liao' from dogviceroy@yahoo.com.tw (Update - Analysis by the Sematic)
Details Website 2011-01-20 49 Jan 20 CVE-2010-3333 DOC Materials.doc from 216.183.175.3 (Cleveland Council on World Affairs)