DNS Shell protocol runs on the application layer of the TCP/IP Model. When an attacker or pentester tries to exploit DNS with RCE vulnerability (Remote Command Execution) destination server acts as the backdoor.
Tool is a python-based Exploitation tool to compromise and also maintain access via command and control to the server.
Must Read Complete Kali Tools tutorials from Information gathering to Forensics
Here I have used Kali Linux(Attacker Machine) and Victim Machine (Windows 10)
NOTE: Command to be executed for direct mode: Python DNS-Shell.py -l -d
You can follow us on Linkedin, Twitter, and Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep yourself self-updated.
In today's digital landscape, maintaining secure and efficient IT systems is critical for organizations. Patch…
In today’s digital era, businesses are increasingly adopting cloud computing to store data, run applications,…
In a sophisticated cyber-espionage operation, a group known as UNC5221, suspected to have China-nexus, has…
A new malware strain known as SuperCard X has emerged, utilizing an innovative Near-Field Communication…
The landscape of cyber threats targeting Canadian financial institutions saw significant shifts after LabHost, a…
In a concerning development within the Android ecosystem, a new malware variant known as "Gorilla"…