New Atomic - Exfiltrate Data using DNS Queries via dig #2994
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Details:
This pull request provides an atomic test focusing on DNS-based data exfiltration techniques via the
dig
command. The test encodes input data in base64 format and sends it as a subdomain within a DNS query to a configurable attacker's DNS server. Input arguments allow for specifying the DNS server's address and port as well as the sensitive information to be encoded. Thedig
command is validated and installed dynamically using multiple package managers to ensure broad platform compatibility.Testing:
The attack scenario was successfully executed, during which the secret data was encoded, sent as part of a DNS query, and subsequently captured by a DNS server hosted on a Docker container. This setup highlights the ability to simulate data exfiltration via DNS and verify the communication flow in a controlled environment.
Screenshots: