Aardvark InfinityinAardvark Infinity### DNS TXT Record Data Transfer: Exfiltrating Data Through DNS Queries#### IntroductionAug 28
Sahan ThilinaLitter — Sherlocks — Hack The Box (dnscat Decoding, Wireshark, Data Exfiltration and Tunneling)https://app.hackthebox.com/sherlocks/Litter/playMar 3
Brayden ProckishHackTheBox Sherlock Writeup: LitterKhalid has just logged onto a host that he and his team use as a testing host for many different purposes. It’s off their corporate network…Aug 23Aug 23
DrorSPL for DNS TunnelingA couple of weeks I set up a honeypot using T-Pot, nothing too exciting. Most of the ‘attacks’ are mass scanners, just out there scanning…Jun 12Jun 12
Aardvark InfinityinAardvark Infinity### DNS TXT Record Data Transfer: Exfiltrating Data Through DNS Queries#### IntroductionAug 28
Sahan ThilinaLitter — Sherlocks — Hack The Box (dnscat Decoding, Wireshark, Data Exfiltration and Tunneling)https://app.hackthebox.com/sherlocks/Litter/playMar 3
Brayden ProckishHackTheBox Sherlock Writeup: LitterKhalid has just logged onto a host that he and his team use as a testing host for many different purposes. It’s off their corporate network…Aug 23
DrorSPL for DNS TunnelingA couple of weeks I set up a honeypot using T-Pot, nothing too exciting. Most of the ‘attacks’ are mass scanners, just out there scanning…Jun 12
Syed Suleman QutbUsing Machine Learning for DNS Exfiltration / Tunnel DetectionCyber Security Defensive Mechanisms built on Supervised Machine Learning Algorithms heavily rely on old historical logs of recent Cyber…Nov 21, 20201