logo
DNS Abuse Techniques Matrix
Infiltration and exfiltration via the DNS
  • English
  • Japanese
Initializing search
    • Index
    • Actions
    • Techniques
      • DGAs
      • Domain name compromise
      • Lame delegations
      • DNS cache poisoning
      • DNS rebinding
      • DNS server compromise
      • Stub resolver hijacking
      • Local recursive resolver hijacking
      • On-path DNS attack
      • DoS against the DNS
      • DNS as a vector for DoS
      • Dynamic DNS resolution (as obfuscation technique)
      • Dynamic DNS resolution: Fast flux (as obfuscation technique)
      • Infiltration and exfiltration via the DNS
      • Malicious registration of (effective) second level domains
      • Creation of malicious subdomains under dynamic DNS providers
      • Compromise of a non-DNS server to conduct abuse
      • Spoofing or otherwise using unregistered domain names
      • Spoofing of a registered domain
      • DNS tunneling - tunneling another protocol over DNS
      • DNS beacons - C2 communication
    • Stakeholders
    • Abuse Matrices

    Infiltration and exfiltration via the DNS

    Exfiltration via the DNS requires a delegated domain or, if the domain does not exist in the public DNS, the operation of a resolver preloaded with that domain's zone file information and configured to receive and respond to the queries sent by the compromised devices.

    Previous
    Dynamic DNS resolution: Fast flux (as obfuscation technique)
    Next
    Malicious registration of (effective) second level domains
    FIRST DNS Abuse Special Interest Group
    TLP:CLEAR