Deep dive into DNS Tunneling

Gupta Bless
5 min readOct 8, 2023
Source

Introduction

Cybercriminals employ this method to circumvent security measures. With the help of the DNS protocol, the attacker in this case was able to send data that has nothing to do with DNS queries or responses. Attackers are able to exfiltrate sensitive data from the server after they have bypassed security safeguards.

--

--

Gupta Bless

Security enthusiast working to secure web for others.