Common Information
Type Value
Value
DNS - T1071.004
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may communicate using the Domain Name System (DNS) application layer protocol to avoid detection/network filtering by blending in with existing traffic. Commands to the remote system, and often the results of those commands, will be embedded within the protocol traffic between the client and server. The DNS protocol serves an administrative function in computer networking and thus may be very common in environments. DNS traffic may also be allowed even before network authentication is completed. DNS packets contain many fields and headers in which data can be concealed. Often known as DNS tunneling, adversaries may abuse DNS to communicate with systems under their control within a victim network while also mimicking normal, expected traffic.(Citation: PAN DNS Tunneling)(Citation: Medium DnsTunneling)
Details Published Attributes CTI Title
Details Website 2009-09-02 270 Bell Canada phish - still about the Cards
Details Website 2009-06-25 3 Fun with Shell Scripts and OS X
Details Website 2009-05-31 45 Phishers Try MSN Worms to steal credentials
Details Website 2009-05-13 6 IP Blacklisting in Snort
Details Website 2009-05-08 3 DoJoSec and dnssnarf
Details Website 2009-04-10 3 Intercepting thick client communications
Details Website 2009-04-03 17 DNS Recon Tool written in Ruby
Details Website 2009-04-01 122 An Analysis of Conficker C
Details Website 2009-03-25 3 Conficker.C Purchase tickets now for the April 1st event
Details Website 2009-03-24 0 Infrastructure Attacks: A Growing Concern
Details Website 2009-03-10 3 Microsoft Tuesday Coverage for March MS09-006, MS09-008
Details Website 2009-02-21 2 Looking for "Bad Stuff", part I
Details Website 2009-02-19 35 Leetness Not Actually Required For Pwnage
Details Website 2009-02-19 1 Making Conficker Cough Up the Goods
Details Website 2009-01-29 0 What didn't fit into the talk. · The Recurity Lablog
Details Website 2009-01-08 2 Setting up a Logon Script through Active Directory Users and Computers in Windows Server 2008 | Petri IT Knowledgebase
Details Website 2008-12-20 10 dpkt Tutorial #3: DNS Spoofing | Jon Oberheide
Details Website 2008-12-18 51 Rootkit takes advantage of MS08-078 vulnerability
Details Website 2008-12-05 0 Home Content Filtering
Details Website 2008-11-30 17 Agent.btz - A Threat That Hit Pentagon
Details Website 2008-11-14 0 Maltego Download - Data Mining & Information Gathering Tool - Darknet - Hacking Tools, Hacker News & Cyber Security
Details Website 2008-10-16 0 Virus Bulletin :: Researchers urge anti-phishing companies to share data
Details Website 2008-08-29 6 Checking Multiple Bits in a Flag Field
Details Website 2008-08-27 10 The Emergence Of A Theme
Details Website 2008-08-27 0 Perception of Vulnerabilities · The Recurity Lablog