Roberto Abraham Scaruffi

Thursday 5 November 2015

Dr. Chaos - Dark Security and Total Chaos



Posted: 04 Nov 2015 06:40 PM PST
Most networks, no matter how highly secured, have vulnerabilities that can be exploited by attackers. This article will explore the DNS protocol and tunneling. It is common to see the DNS protocol used to establish outbound sessions from a restricted network, then tunnel other protocols through the DNS connection. There are many attack tools, malware, […]