Categories: Exploitation Tools

DNS Shell – Tool to Compromise and Maintain Control Over Victim Machine

DNS Shell protocol runs on the application layer of the TCP/IP Model. When an attacker or pentester tries to exploit DNS with RCE vulnerability (Remote Command Execution) destination server acts as the backdoor.

Tool is a python-based Exploitation tool to compromise and also maintain access via command and control to the server.

Must Read Complete Kali Tools tutorials from Information gathering to Forensics

Here I have used Kali Linux(Attacker Machine) and Victim Machine (Windows 10)

ATTACKER MACHINE

  • Download the SHELL tool HERE
  • Execute the command: python DNS-SHELL.py
  • It can be utilized with different modes, Recursive mode (It will run the DNS name) and Direct mode will run as the Ip address provided (Kali Linux IP)

Generating Payload – DNS Shell

  • The above Figure is in Recursive mode.
  • Recursive Command Executed: Python DNS-Shell.py -l -r <Domain Name>

NOTE: Command to be executed for direct mode: Python DNS-Shell.py -l -d

  • The above figure shows recursive mode has generated a payload.

Victims Machine

  • Run & Execute the Command with CMD: Powershell.exe -e <Copy and paste the Generated Payload HERE>

BACK TO THE ATTACKERS MACHINE

  • Once the payload is executed in the victim’s machine. The shell of the Windows 10 machine is obtained.
  • The above Figure shows destination (windows 10) now acts as a backdoor and the command is entered and turned to Convert Channel to over port 53 of DNS.Happy Hacking !!!

You can follow us on LinkedinTwitter, and Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep yourself self-updated.

BALAGANESH

Recent Posts

10 Best Patch Management Tools 2025

In today's digital landscape, maintaining secure and efficient IT systems is critical for organizations. Patch…

6 hours ago

10 Best Cloud Security Solutions 2025

In today’s digital era, businesses are increasingly adopting cloud computing to store data, run applications,…

6 hours ago

Chinese Hackers Exploit Ivanti Connect Secure Flaw to Gain Unauthorized Access

In a sophisticated cyber-espionage operation, a group known as UNC5221, suspected to have China-nexus, has…

7 hours ago

New Android SuperCard X Malware Uses NFC-Relay Technique for POS & ATM Transactions

A new malware strain known as SuperCard X has emerged, utilizing an innovative Near-Field Communication…

8 hours ago

SheByte PaaS Launches $199 Subscription Service for Cybercriminals

The landscape of cyber threats targeting Canadian financial institutions saw significant shifts after LabHost, a…

8 hours ago

Gorilla Android Malware Intercepts SMS to Steal One-Time Passwords

In a concerning development within the Android ecosystem, a new malware variant known as "Gorilla"…

8 hours ago