Title
DNS tunneling for network penetration
Abstract
Most networks are connected to the Internet through firewalls to block attacks from the outside and to limit communication initiated from the inside. Because of the limited, supposedly safe functionality of the Domain Name System protocol, its traffic is by and large neglected by firewalls. The resulting possibility for setting up information channels through DNS tunnels is already known, but all existing implementations require help from insiders to set up the tunnels. This paper presents a new Metasploit module for integrated penetration testing of DNS tunnels and uses that module to evaluate the potential of DNS tunnels as communication channels set up through standard, existing exploits and supporting many different command-and-control malware modules.
Year
DOI
Venue
2012
10.1007/978-3-642-37682-5_6
ICISC
Keywords
Field
DocType
existing implementation,integrated penetration testing,safe functionality,resulting possibility,different command-and-control malware module,network penetration,dns tunneling,information channel,communication channel,domain name system protocol,dns tunnel,new metasploit module,tunneling,domain name system
Quantum tunnelling,Computer science,Domain Name System,Communication channel,Computer network,Implementation,Exploit,Malware,The Internet
Conference
Citations 
PageRank 
References 
4
0.69
6
Authors
7
Name
Order
Citations
PageRank
Daan Raman141.02
Bjorn De Sutter278360.65
Bart Coppens3998.98
Stijn Volckaert4748.74
Koen De Bosschere51659117.74
Pieter Danhieux640.69
Erik Van Buggenhout740.69