DNS Tunneling Used for Stealthy Scans and Email Tracking

By Deeba Ahmed
Hackers are hiding malicious messages in everyday internet traffic! Learn how DNS tunneling works and how to protect yourself from this sneaky cyberattack. Stop hackers from scanning your network and tracking your clicks.
This is a post … Continue reading DNS Tunneling Used for Stealthy Scans and Email Tracking

How DNS Attack Dynamics Evolved During the Pandemic

The Domain Name System (DNS) is the “Internet’s address book;” the essential, trusted, rarely scrutinized protocol that keeps the internet running by mapping readable domain names to IP addresses. More than 2.2 trillion DNS queries a… Continue reading How DNS Attack Dynamics Evolved During the Pandemic

Covert Data Channel in TLS Dodges Network Perimeter Protection

Researchers have found a new covert data exchange technique that abuses the TLS protocol that can circumvent traditional network perimeter protections. Continue reading Covert Data Channel in TLS Dodges Network Perimeter Protection

Covert Data Channel in TLS Dodges Network Perimeter Protection

Researchers have found a new covert data exchange technique that abuses the TLS protocol that can circumvent traditional network perimeter protections. Continue reading Covert Data Channel in TLS Dodges Network Perimeter Protection

DNS Tunneling: Getting The Data Out Over Other Peoples’ WiFi

[KC Budd] wanted to make a car-tracking GPS unit, and he wanted it to be able to phone home. Adding in a GSM phone with a data plan would be too easy (and more expensive), so he opted for the hacker’s way: tunneling the data over DNS queries every time the device found an open WiFi hotspot. The result is a device that sends very little data, and sends it sporadically, but gets the messages out.

This system isn’t going to be reliable — you’re at the mercy of the open WiFi spots that are in the area. This certainly …read more

Continue reading DNS Tunneling: Getting The Data Out Over Other Peoples’ WiFi