Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

New Atomic - Exfiltrate Data using DNS Queries via dig #2994

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

krdmnbrk
Copy link
Contributor

Details:
This pull request provides an atomic test focusing on DNS-based data exfiltration techniques via the dig command. The test encodes input data in base64 format and sends it as a subdomain within a DNS query to a configurable attacker's DNS server. Input arguments allow for specifying the DNS server's address and port as well as the sensitive information to be encoded. The dig command is validated and installed dynamically using multiple package managers to ensure broad platform compatibility.

Testing:
The attack scenario was successfully executed, during which the secret data was encoded, sent as part of a DNS query, and subsequently captured by a DNS server hosted on a Docker container. This setup highlights the ability to simulate data exfiltration via DNS and verify the communication flow in a controlled environment.

Screenshots:
image

image

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants