Exploit code with DNS tunnel

Hacker Ron Bowes has released various payloads that connect a shell’s standard input and output with a suitable online counterpart through DNS. This allows attackers to bypass many firewalls and even attack systems that have no internet connection themselves.
For a DNS tunnel, the host computer only needs to be able to resolve external host names such as http://www.h-online.com. It can then handle its network traffic via sent DNS queries and responses. This concept was already demonstrated by Julien Oster and Florian Heinz via the Name Server Transfer protocol (NSTX), which tunnels entire IP connections via DNS.

Ron Bowes has combined this with a command line shell for Linux and Windows, packaging the shell code in such a way that it can conveniently be integrated into exploits. He has even created a metasploit payload.

Please access the link below for complete information about this subject.

Weaponizing dnscat with shellcode and Metasploit

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: