Videos
Hacking Demo #3 Data Exfiltration
Get the latest news, invites to events, and much more
As the DNS protocol is authorized to go from the inside of the network to the Internet, some have found a way to use it to silently exfiltrate valuable data. Malware installed on a victim’s computer can use the DNS protocol to send the data using a simple encoding mechanism that requires nothing more than access to a recursive DNS server.
Exfiltrating information via DNS can be very discrete- sending a few packets per day- or extremely intense- sending thousands of stolen credit cards numbers and information per minute. Since the DNS protocol does not trigger alarms on the supervision systems, it can be used to exfiltrate a lot of information before the domain is caught by standard reputation filters (if installed).
See Also
Simplify & Secure Your Network
When our goal is to help companies face the challenges of modern infrastructures and digital transformation, actions speak louder than words.