Amplification attacks occur when an attacker takes advantage of a DNS server that permits recursive lookups and uses recursion to spread his attack to other DNS servers. In simpler terms, rather than sending traffic directly from a botnet to a victim, the botnet forwards DNS requests to other sy...
Enabling an attacker on a compromised machine, to abuse the DNS protocol. Malicious communication over DNS can be used for data exfiltration, command, and control, and/or evading corporate network restrictions.Learning period:NoneMITRE:Expand table ...
AQUATONE - Subdomain discovery tool utilizing various open sources producing a report that can be used as input to other tools. CloudFail - Unmask server IP addresses hidden behind Cloudflare by searching old database records and detecting misconfigured DNS. DNSDumpster - Online DNS recon and searc...
WAVES OF DNS HIJACKING ATTEMPTS TARGET D-LINK ROUTERSA spate of DNS hijackings over the past three months, aimed at consumer-grade routers mostly from D-Link, have been diverting traffic from a number of well-known domains and directing them elsewhere.Sam VargheseExchange...