DNS Shell protocol runs on the application layer of the TCP/IP Model. When an attacker or pentester tries to exploit DNS with RCE vulnerability (Remote Command Execution) destination server acts as the backdoor.
Tool is a python-based Exploitation tool to compromise and also maintain access via command and control to the server.
Must Read Complete Kali Tools tutorials from Information gathering to Forensics
Here I have used Kali Linux(Attacker Machine) and Victim Machine (Windows 10)
NOTE: Command to be executed for direct mode: Python DNS-Shell.py -l -d
You can follow us on Linkedin, Twitter, and Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep yourself self-updated.
A recent security vulnerability in a widely used airline integration service has exposed millions of…
In a groundbreaking cybersecurity investigation, researchers identified several critical vulnerabilities in a target system, eventually…
A critical vulnerability in the Cacti performance monitoring framework tracked as CVE-2025-22604, has been disclosed,…
Cisco Talos researchers have identified an ongoing cyber campaign, active since mid-2024, deploying a previously…
A groundbreaking technique for exploiting Windows systems has emerged, combining the "Bring Your Own Vulnerable…
Microsoft has taken a significant step toward enhancing cybersecurity by introducing a new phishing attack…