4.9 • 696 Ratings
🗓️ 27 July 2016
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Wednesday, July 27th, 2016 edition of the Santernet Storm Center's |
0:07.0 | Stormcast. |
0:08.0 | My name is Johannes Ulrich and I'm recording from Jacksonville, Florida. |
0:12.0 | Usually when I'm teaching our intrusion detection in-depth class, SEC 503, I demonstrate some data exfiltration via DNS. Now, typically, in order to then retrieve |
0:26.3 | additional commands, I'm using text records. That's what most people do in a case like this. |
0:33.2 | But of course, the problem with text records is that they're not all that usual and are a bit more noisy than it could be. |
0:42.1 | Well, last time in a demo of the script I sort of got the idea that I could also do that via quad A records instead of text records. |
0:51.8 | Quad A records return IPV6 addresses. |
0:54.9 | Of course, there I have 16 bytes of hexadecimal data that can then easily be converted back into a shelf script on the receiving end. |
1:05.5 | So today I wrote up a little diary around this with scripts that allow you to upload a script into a |
1:13.1 | DNS server as quad A records and then to retrieve it from the compromised host again |
1:20.8 | using shell tools like dig in all and then convert the hexadecimal output into the shell command, |
1:28.7 | that in turn, exfeltrates Zeta back to the DNS server via standard A queries. |
1:34.8 | Pretty neat script, so if you need it for a pen test or so, |
1:38.9 | let me know how it works for you. |
1:40.7 | From a defensive point of view, of course, |
1:43.8 | just like any covert channel, you do |
1:46.3 | want to look at anomalies like why is a certain server looking up so many DNS records that |
1:53.4 | should raise an alert. And Microsoft announced that it will unify its different mobile |
2:00.4 | authenticator offerings. |
2:02.6 | Right now Microsoft has two different authenticators, one for your Microsoft account when you |
2:09.1 | log in on a website. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.