DNS Data exfiltration — What is this and How to use?

1. What is DNS Data exfiltration and how does it work?

Figure 1. A simple definition of DNS Data exfiltration
Figure 2. A DNS resolution flow (source: tcpipguide.com)
Figure 3. A setting of NS records
Figure 4. An example which uses DNS Data exfiltration (source: blogs.akamai.com)
Figure 5. Use CNAME record to send data from outside

2. How to use DNS Data exfiltration?

Figure 6. Screenshot of requestbin.net/dns

--

--

--

I'm a developer working in cyber security. My regularly IDE is MS Word.

Love podcasts or audiobooks? Learn on the go with our new app.

Defiance Introduces World’s First ETF Concentrated on NFTs

Hacker Fest:2019 — Walkthrough

Finding exposed services on the target machine using the nmap tool

4 Reasons You Should Start Valuing Messaging Apps Based on a Serverless Concept

Good news for Airdrop participants

Personal Data: The Ethics Behind the Subject

Delete Button of the Universe

Why is Mobile Cybersecurity Becoming so Critical Day by Day

Are these Cryptocurrencies Quantum Secure? | QRL, Mochimo, IOTA, Cardano

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
cuongmx

cuongmx

I'm a developer working in cyber security. My regularly IDE is MS Word.

More from Medium

Create secured connection via ssh to AWS Lightsail instance

3 Best Practices to Reduce Your AWS Cloud Costs

Meet data compliance with iDox.ai Chrome extension

ODI Marketplace Provisioning in Oracle Cloud