Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using different approaches.
-
Updated
May 6, 2024 - JavaScript
Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using different approaches.
This lab simulates a DNS tunneling attack—a covert channel where attackers exfiltrate data or maintain command-and-control communication over DNS queries—and shows how to detect such anomalies using Wireshark, Snort IDS, and Splunk. The objective of the lab is to: Analyze DNS-based covert communications using .pcap files. Identify suspicious
Add a description, image, and links to the dnscat2 topic page so that developers can more easily learn about it.
To associate your repository with the dnscat2 topic, visit your repo's landing page and select "manage topics."