利用DNS进行命令与控制:Troy Wojewoda的技术解析

本文探讨了DNS如何被滥用于命令与控制(C2)通信,详细分析了攻击者利用DNS协议隐藏恶意活动的方法,包括技术架构和防御策略,适合安全从业者参考。

Webcast: How DNS can be abused for Command & Control w/ Troy Wojewoda

Slides
[查看幻灯片]

相关Webcast

  • Webcast: Introduction to Pentesting w/ Mike Felch
  • Webcast: How Bartending Made Me a Better Infosec Consultant w/ Ben Burkhart

查找内容?
按类别浏览:

  • Alyssa Snow (8)
  • Ashley Knowles (1)
  • Ashley Van Hoesen (1)
  • Author (402)
  • Backdoors & Breaches (7)
  • Beau Bullock (32)
  • Ben Bowman (4)
  • Ben Burkhart (1)
  • Blue Team (105)
  • Blue Team Tools (44)
  • Brian Fehrman (19)
  • Brian Ireland (1)
  • Brian King (20)
  • Bronwen Aker (2)
  • C2 (29)
  • Cameron Cartier (3)
  • Carrie Roberts (5)
  • Chris Sullo (1)
  • Chris Sullo’ (2)
  • Chris Traynor (2)
  • CJ Cox (8)
  • Connor Costigan (1)
  • Corey Ham (4)
  • Craig Vincent (4)
  • Dale Hobbs (5)
  • Daniel Pizarro (1)
  • Darin Roberts (1)
  • Dave Blandford (4)
  • David Fletcher (30)
  • David Perez (1)
  • Deb Wigley (1)
  • Debjeet Banerjee (1)
  • Derek Banks (13)
  • Derrick Rauch (1)
  • DFIR (1)
  • DNSTAP (1)
  • Ethan Robish (14)
  • External/Internal (71)
  • Fernando Panizza (1)
  • Finding (10)
  • Fun & Games (62)
  • Gabriel Prud’homme (1)
  • General InfoSec Tips & Tricks (91)
  • GRC (3)
  • Guest Author (6)
  • Hal Denton (3)
  • Hardware Hacking (23)
  • Hayden Covington (3)
  • How-To (264)
  • Hunt Teaming (14)
  • Incident Response (11)
  • Informational (433)
  • InfoSec 101 (276)
  • InfoSec 201 (42)
  • InfoSec 301 (14)
  • Intern (2)
  • Isaac Burton (1)
  • Jack Hyland (2)
  • James Marrs (2)
  • Jason Blanchard (7)
  • Joff Thyer (35)
  • John Malone (4)
  • John Strand (123)
  • Jordan Drysdale (67)
  • Joseph Kingstone (2)
  • Justin Angel (4)
  • Kaitlyn Wimberely (1)
  • Kent Ickler (39)
  • Kevin Klingbile (1)
  • Kiersten Gross (2)
  • Kyle Avery (3)
  • Linux (1)
  • LLMNR (6)
  • Marcello Salvati (1)
  • Matthew Eidelberg (3)
  • Max Boehner (1)
  • Melissa Bruno (3)
  • Michael Allen (8)
  • Mike Felch (15)
  • Mitchell Stein (1)
  • Mobile (10)
  • moth (4)
  • News (134)
  • Nick Caswell (1)
  • Noah Heckman (3)
  • Password Cracking (12)
  • Password Spray (16)
  • Patterson Cake (5)
  • Phishing (28)
  • Physical (16)
  • Podcasts (182)
  • Ralph May (4)
  • Ray Felch (17)
  • Recon (20)
  • Red Team (224)
  • Red Team Tools (98)
  • Robert Schwass (1)
  • Sally Vandeven (1)
  • Sean Verity (4)
  • Serena DiPenti (5)
  • SOC (1)
  • Social Engineering (15)
  • Steve Borosh (7)
  • Terry Reece (2)
  • Tim Fowler (5)
  • Tom Smith (1)
  • Troy Wojewoda (4)
  • Web App (32)
  • Webcast Wrap-Up (10)
  • Webcasts (148)
  • Wireless (15)
  • Wrap-Up (1)

最近文章

  • 使用Airodump-ng从Aircrack-ng套件中寻找无线网络中的弱点
  • 检测ADCS权限提升:Active Directory证书服务(ADCS)的使用
  • 使用Nmap进行漏洞扫描:Nmap,也称为网络映射器,是一种常用工具

按主题浏览
Active Directory, ADHD, AI, anti-virus, Attack Tactics, AV, Beau Bullock, BHIS, Blue Team, bypassing AV, C2, Carrie Roberts, cloud, Cyber Deception, encryption, hacking, infosec, Infosec for Beginners, Joff Thyer, john strand, Jordan Drysdale, Kent Ickler, Linux, MailSniper, Microsoft, Nessus, passwords, password spraying, pen-testing, penetration testing, pentest, Pentesting, phishing, podcast, PowerShell, Python, Raymond Felch, Red Team, red teaming, RITA, Sysmon, tools, webcast, webcasts, Windows

归档
从2025年7月到2015年3月,按月浏览文章归档。

返回顶部

Black Hills Information Security, Inc.
890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008
关于我们 | BHIS Tribe of Companies | 隐私政策 | 联系

链接
搜索网站

comments powered by Disqus
使用 Hugo 构建
主题 StackJimmy 设计