TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Exfiltrate Files with DNS Queries

44 pointsby 16sover 11 years ago

10 comments

X-Istenceover 11 years ago
Dan Kaminsky a couple of years ago did a talk about this, as well as using DNS to cache files...<p><a href="http://byteworm.com/2010/10/27/free-content-delivery-network-using-dns-cache/" rel="nofollow">http:&#x2F;&#x2F;byteworm.com&#x2F;2010&#x2F;10&#x2F;27&#x2F;free-content-delivery-network...</a><p>Exfiltrating using DNS, or VPN over DNS and the various other techniques are not new.<p>They do show how difficult it is to police data from leaving ones network.
评论 #6293422 未加载
dglover 11 years ago
This seems to use base64, DNS is case insensitive so really it should use base32 or some other encoding scheme. However DNS is usually case preserving so it will likely work.<p>Unless the recursive nameserver in use happens to implement this hack for improved security: <a href="http://tools.ietf.org/html/draft-vixie-dnsext-dns0x20-00" rel="nofollow">http:&#x2F;&#x2F;tools.ietf.org&#x2F;html&#x2F;draft-vixie-dnsext-dns0x20-00</a>
评论 #6294465 未加载
评论 #6293594 未加载
bryogenicover 11 years ago
Don&#x27;t just get files, use DNS for Command and Control too.<p><a href="http://blog.strategiccyber.com/2013/06/06/dns-command-and-control-added-to-cobalt-strike/" rel="nofollow">http:&#x2F;&#x2F;blog.strategiccyber.com&#x2F;2013&#x2F;06&#x2F;06&#x2F;dns-command-and-co...</a>
评论 #6294125 未加载
agnokapatheticover 11 years ago
The author of sqlmap added DNS exfiltration for blind SQL injection last year. Really creative technique (DNS stack doubled the size of sqlmap code-base).<p>Paper: <a href="http://arxiv.org/pdf/1303.3047.pdf" rel="nofollow">http:&#x2F;&#x2F;arxiv.org&#x2F;pdf&#x2F;1303.3047.pdf</a><p>Slides: <a href="http://www.slideshare.net/stamparm/dns-exfiltration-using-sqlmap-13163281" rel="nofollow">http:&#x2F;&#x2F;www.slideshare.net&#x2F;stamparm&#x2F;dns-exfiltration-using-sq...</a>
gwu78over 11 years ago
8 bytes at a time.<p>Wouldn&#x27;t that mean 100&#x27;s, 1000&#x27;s or 10&#x27;s of thousands of requests for nonsensical subdomains of the same domain name (and that domain name is probably a silly one if you got it recently for 10 bucks).<p>This is not anomalous DNS traffic? My imagination just does not stretch this far. If the title was just &quot;Transfer a file via DNS&quot;, maybe I could play along.<p>I think nstx preceded iodine.<p>Here&#x27;s another one no one has mentioned yet:<p><a href="http://www.skullsecurity.org/wiki/index.php/Dnscat" rel="nofollow">http:&#x2F;&#x2F;www.skullsecurity.org&#x2F;wiki&#x2F;index.php&#x2F;Dnscat</a><p>What I&#x27;d really like to see is an implementation of lcamtuf&#x27;s old, pre-cloud&#x2F;dropbox idea: daemon caches, specifically recursive DNS caches, as free, (temporary) distributed storage. Anyone can store data for free on 100&#x27;s of 1000&#x27;s of networked computers worldwide, otherwise known as recursive DNS caches. Currently we only store &quot;domain names&quot; on these servers, but as the OP shows, it&#x27;s possible to encode more information into requests than just domain names.<p>Imagine if the encoded data was an image. With most recursive DNS servers, the data expires upon the TTL expiry. Snapchat via DNS.
ryan-cover 11 years ago
This is a hack of mine that stores files in public DNS caches. It&#x27;s a horrible, hack and slow but it does work.<p><a href="https://github.com/ryancdotorg/dnsstore" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;ryancdotorg&#x2F;dnsstore</a>
评论 #6303163 未加载
malandrewover 11 years ago
<p><pre><code> &quot;When&#x2F;if the network security team figures this out and blocks it, I&#x27;ll demonstrate a few other ways in which data can be exfiltrated.&quot; </code></pre> I loved this line.<p>He mentions blocking there, but given the technique, could forensics show that this has been used? For example, could some future whistleblower for a national security agency (ours or anyone else&#x27;s for that matter) use this to exfiltrate files without risk of discovery after the fact?<p>Could an organization like wikileaks or the guardian use this as a technique for whistleblowers to leak files safely?
评论 #6295227 未加载
contingenciesover 11 years ago
People have been doing covert channels over DNS in the wild since &lt;2001. Fast forward 12 years, and this is the new &#x27;my first socket app&#x27;.
sg2342over 11 years ago
there was a related talk [1] at the usenix 2013 in which this (quite old i might add) method of information ex-filtration was analyzed.<p>bottom line: amateurs get caught.<p>[1] <a href="https://www.usenix.org/conference/usenixsecurity13/practical-comprehensive-bounds-surreptitious-communication-over-dns" rel="nofollow">https:&#x2F;&#x2F;www.usenix.org&#x2F;conference&#x2F;usenixsecurity13&#x2F;practical...</a>
malandrewover 11 years ago
Could gifsockets be used to exfiltrate a file as well?<p><a href="https://github.com/videlalvaro/gifsockets" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;videlalvaro&#x2F;gifsockets</a>