Versionen im Vergleich

Schlüssel

  • Diese Zeile wurde hinzugefügt.
  • Diese Zeile wurde entfernt.
  • Formatierung wurde geändert.


Seiteneigenschaften


Since the The Domain Name System (DNS) is one of the fundamental services of the Internet, and therefore companies and organisations usually allow the DNS protocol to pass bidirectionally through their firewall. This is necessary so that, for example, employees can call up external websites and customers or interested parties prospective customers are able to find the company's websites.

One way to attack a network via DNS is the method of DNS tunneling. Here, DNS requests are used to implement a command and control channel for malware. Incoming DNS traffic transmits the commands to the malware and outgoing DNS traffic transmits sensitive data and information to the attacker. DNS tunneling tunnelling can also be used to circumvent network regulations in networks, e.g. by leveraging hotspot logins or blocked services.

Since Due to the fact that the DNS protocol is very adaptable, such actions are usually successful. The requests are designed to be sent to DNS servers that are controlled by the attackers. Thus, the DNS servers are able to receive the requests and transmit data in corresponding DNS responses.

Since numerous DNS tunneling tools are offered for download on the Internet, DNS tunneling attacks can be carried out quite easily. Even inexperienced attackers are thus able to smuggle route data past the security devices of a network (e.g. a firewall) or, for example, to bypass the login to a (paidchargeable) WLAN hotspot without having to authenticate the requesting WLAN client.

...