triw0lf / HEARTH

A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters to share knowledge, collaborate on techniques, and advance the field of threat hunting.
https://threathuntingcommunity.com/
152 stars 12 forks source link

Data exfiltration through DNS #16

Open 4TheSmarts opened 5 days ago

4TheSmarts commented 5 days ago

Hunt Type 🔥

{"Flames (Hypothesis-Driven)"=>"Based on assumptions about adversary behavior or specific activities."}

HEARTH Crafter

Cody Lunday

Hunt Idea / Hypothesis

An adversary is utilizing DNS tunneling to exfiltrate data through DNS port 53.

MITRE ATT&CK Tactic

Exfiltration Over Alternative Protocol

Implementation Notes

Attackers are interested in finding unmonitored communication channels to evade detection.

Search Tags

DNS #Tunneling #Exfiltration

Value and Impact

Knowledge Base

https://attack.mitre.org/techniques/T1048/ https://brightsec.com/blog/dns-tunneling/