Data Exfiltration Techniques: DNS Exfiltration | TryHackMe

An overview of data exfiltration methods focusing on DNS exfiltration techniques, with additional resources for cybersecurity certification notes and cheat sheets.

Data Exfiltration Techniques: DNS Exfiltration | TryHackMe
Motasem Hamdan
13.9K views • Sep 7, 2022
Data Exfiltration Techniques: DNS Exfiltration | TryHackMe

About this video

🚀 Cyber Security Certification Notes
https://shop.motasem-notes.net/collections/cyber-security-study-notes
🚀OR Certification Notes with Cheat Sheets
https://buymeacoffee.com/notescatalog/extras
đź’ˇCyber Security Notes | Membership Access
https://buymeacoffee.com/notescatalog/membership
🔥Download FREE Cyber Security 101 Study Notes
https://buymeacoffee.com/notescatalog/e/290985
***
In this video walk-through, we covered Data Exfiltration through DNS protocol and performed C2 through DNS as well.
**********
Receive Cyber Security Field Notes and Special Training Videos
https://www.youtube.com/channel/UCNSdU_1ehXtGclimTVckHmQ/join
*******
Writeup
https://motasem-notes.net/dns-tunneling-explained-tryhackme-dns-data-exfiltration/
TryHackMe Data Exfiltration
https://tryhackme.com/r/room/dataxexfilt
*****
Store
https://buymeacoffee.com/notescatalog/extras
Patreon
https://www.patreon.com/motasemhamdan
LinkedIn
[1]: https://www.linkedin.com/in/motasem-hamdan-7673289b/
[2]: https://www.linkedin.com/in/motasem-eldad-ha-bb42481b2/
Instagram
https://www.instagram.com/motasem.hamdan.official/
Google Profile
https://maps.app.goo.gl/eLotQQb7Dm6aiL8z6
Twitter
https://twitter.com/ManMotasem
Facebook
https://www.facebook.com/motasemhamdantty/
***
0:00 - Introduction to Data Exfiltration over DNS
0:32 - Why Use DNS for Exfiltration?
1:16 - How Data Moves Through Subdomains
2:35 - Key Limitations of DNS Exfiltration
5:11 - Example: Exfiltrating Credit Card Data
5:46 - Requirements for DNS Exfiltration
6:09 - Setting Up a Domain for Exfiltration
8:03 - Configuring a DNS Server
8:27 - Live Scenario: Setting Up the Attacker Machine
10:07 - Opening a Listener on the Attacker Machine
11:09 - Preparing the Victim Machine
12:14 - Converting Data to Base64
14:08 - Splitting Base64 Data for Subdomains
16:22 - Sending DNS Requests with Data
17:06 - Receiving and Decoding Data on the Attacker Side
17:41 - Command and Control (C2) Communication via DNS
18:14 - Creating Text Records for C2 Commands
19:23 - Final Task: Using DNS for Flag Retrieval
20:00 - Summary and Additional Resources

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

13.9K

Likes

167

Duration

20:13

Published

Sep 7, 2022

User Reviews

4.4
(2)
Rate:

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.