Tag: Command and Control
DNS Shell – Tool to Compromise and Maintain Control Over Victim Machine
DNS protocol runs on the application layer of the TCP/IP Model. When an attacker or pentester tries to exploit DNS with RCE vulnerability (Remote Command Execution)...
Domain Fronting – A New Technique For Hiding Malware Command and Control (C2) Traffic...
A New Technique called " Domain Fronting " allow cybercriminals to hide the command & control Networks Traffic within a CDN. It acts as a...
WebDAV to Run a Secret Communication Channel between Victim and Control Server
WebDAV(Web Distributed Authoring and Versioning) is the extended framework of HTTP protocol which includes more features such as clients can connect to the web...