当前位置:网站首页>DNS cloud school | analysis of hidden tunnel attacks in the hidden corner of DNS
DNS cloud school | analysis of hidden tunnel attacks in the hidden corner of DNS
2022-04-23 20:15:00 【National Engineering Research Center】
DNS It's a web service portal , It is the only way for all business visits . Normal business needs to pass DNS Access the service , Malicious programs also need to pass DNS Outreach . data display , near 91.3% Malicious programs were found to use DNS As the main means of invasion . This is because DNS The fragility of the protocol itself makes it easy to be used , And the attacker can hide himself well .DNS Tunnel attack is one of the attack methods often used by attackers , Analysis of cloud school in this issue DNS The principle of tunnel attack , Share the basic ideas for judging tunnel attacks ,enjoy:
One 、DNS Principle and characteristics of tunnel attack
Schematic diagram of basic principle
-
DNS Overview of tunnel attack principle
utilize DNS The query process , Encapsulate illegal data compression coding in DNS Agreement , And then to DNS Request and response packets complete the transmission of data ( signal communication ).
-
DNS Application of tunnel attack
Through C&C The server completes point-to-point data propagation , Or implant a Trojan horse 、 worm 、 Malware, etc. complete long-term hidden APT attack .
-
DNS The advantages of tunnel attack
For traditional safety equipment , Such as network firewall, it has strong penetration ;DNS The cost of attack is relatively low , But the attack effect is obvious .
-
DNS Tunnel attack features
The attacker's traffic data is encapsulated in DNS Agreement , Traditional safety equipment is difficult to find , From the perspective of traffic packets, it is not easy to identify , No professional analysis will only be considered 53 port DNS data , Concealment is strong .
Two 、 utilize DNS Tunnel attack example
-
adopt DNS The tunnel realizes data transmission
A malicious program encapsulates control instructions in DNS Request and response interaction in the protocol , The real control instructions in the request and response are encoded into a string .
Generally, the domain name that initiates the request is Base64,Binary code ,NetBios code 、Hex Code and other coding methods for encryption , In order to transmit more data, generally TXT type (DNS A type of request ). Therefore, it is difficult to consider that firewall and intrusion detection equipment are in normal recursive out of the network DNS Flow analysis and filtration , therefore , Attackers can use it to achieve attacks such as remote control .
-
adopt DNS The tunnel realizes data transmission
DNS In addition to enabling malicious programs and C&C Control instruction interaction at the end , It can also provide an always available rear tunnel for attackers to disclose stolen data or sensitive data . Although limited by the length of the domain name , as well as UDP Unreliability of transmission , utilize DNS It is difficult for the tunnel to transmit large documents to the outside , But transmitting important and sensitive information is enough . The above figure shows that it is transmitted to the control end through continuous subdomain request , Then, at the control end, these requests are spliced together in order to obtain sensitive data .
Pass... In the test environment Wireshark And other packet capture tools , It can be seen that DNS Tunnel file transfer DNS The message interaction process has the following characteristics : Request a series of super long random subdomains 、 The requested domain name contains a serial number 、 High frequency access to the same parent domain 、 The request response packet is large 、 Faster request frequency 、DNS Traffic surge .
3、 ... and 、DNS Tunnel attack judgment and analysis method
at present ,DNS Tunnel technology has been very mature , There are many related tools , And different tools have their own characteristics . At present, the more active ones are iodine,dnscat2, Others are DeNise,dns2tcp,Heyoka wait .
Through the previous introduction , It's not hard to see DNS Tunnel attack has a strong camouflage . But they all have one thing in common —— The request and response look strange ; So how do we detect ? So , in the light of DNS Principle and characteristics of tunnel attack , We sorted out the ideas and methods of judging the attack :
① Comparative analysis of modeling features
Let's take a look at modeling and comparing the following features :
-
Domain name length 、 Legal characters of domain name 、 domain name RFC The rules , Modeling feature comparison
-
Proportion of uplink large packet in request message , Modeling feature comparison
-
The proportion of downlink packets in the total number of response messages , Modeling feature comparison
-
Information entropy , Modeling feature comparison
② Critical value of characteristic analysis
Through our modeling and analysis of different scenarios , It's not hard to find that we can target DNS Some characteristics of tunnel flow are summarized, namely “ critical value ”, For example, domain name label String length 52、 Legal characters of domain name a-z, A-Z, 0-9、 Upload and download ratio %500; At the same time, the total number of session messages is greater than 20 Wait a minute . By targeting DNS For the detection of tunnel flow, we can achieve certain effective defense by matching the critical value .
In addition, we can also learn from other DNS Carry features 、 Flow analysis and other aspects, so as to achieve the effect of protection .
Four 、 Conclusion
DNS Tunnel is an important for network attackers “ Commit crime ” methods , At present, there are many public or undisclosed tools . In the traditional means of safety protection , Not for DNS Traffic protection strategy , Boundary devices usually target 53 Port traffic release , therefore , If the DNS The flow is not subject to any supervision , It is very likely that DNS Safety protection , Make the safety system that enterprises spend a lot of money to build become “ Achilles' Heel ”.
This article is only for DNS The principle and basic analysis and judgment of tunnel attack 、 Protection is briefly introduced , Deeper targeted strategies also need to be summarized from practice . Today's sharing is here , If you have any questions about DNS Other problems with tunnel attacks , Welcome to leave a message at the bottom of the article , We will arrange professional engineers to answer your questions , Next stage 《DNS Cloud school 》 Let's see each other !
版权声明
本文为[National Engineering Research Center]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204210554571159.html
边栏推荐
- R language uses the preprocess function of caret package for data preprocessing: BoxCox transform all data columns (convert non normal distribution data columns to normal distribution data and can not
- LeetCode动态规划训练营(1~5天)
- Notes of Tang Shu's grammar class in postgraduate entrance examination English
- 还在用 ListView?使用 AnimatedList 让列表元素动起来
- R language uses econocrats package to create microeconomic or macroeconomic map, visualize indifference function indifference curve, customize calculation intersection, and customize the parameters of
- C6748 software simulation and hardware test - with detailed FFT hardware measurement time
- How does onlyoffice solve no route to host
- CVPR 2022 | querydet: use cascaded sparse query to accelerate small target detection under high resolution
- 中金财富公司怎么样,开户安全吗
- Sqoop imports data from Mysql to HDFS using lzop compression format and reports NullPointerException
猜你喜欢
selenium. common. exceptions. WebDriverException: Message: ‘chromedriver‘ executable needs to be in PAT
Fundamentals of network communication (LAN, Wan, IP address, port number, protocol, encapsulation and distribution)
Shanda Wangan shooting range experimental platform project - personal record (IV)
PCL点云处理之计算两平面交线(五十一)
MySQL 进阶 锁 -- MySQL锁概述、MySQL锁的分类:全局锁(数据备份)、表级锁(表共享读锁、表独占写锁、元数据锁、意向锁)、行级锁(行锁、间隙锁、临键锁)
selenium.common.exceptions.WebDriverException: Message: ‘chromedriver‘ executable needs to be in PAT
antd dropdown + modal + textarea导致的textarea光标不可被键盘控制问题
程序设计语言基础(2)
[text classification cases] (4) RNN and LSTM film evaluation Tendency Classification, with tensorflow complete code attached
WordPress plug-in: WP CHINA Yes solution to slow domestic access to the official website
随机推荐
Video understanding
Introduction to electron tutorial 3 - process communication
Sqoop imports data from Mysql to HDFS using lzop compression format and reports NullPointerException
Scrum Patterns之理解各种团队模式
Mysql database - single table query (I)
山东大学软件学院项目实训-创新实训-网络安全靶场实验平台(六)
aqs的学习
Record: call mapper to report null pointer Foreach > the usage of not removing repetition;
PCA based geometric feature calculation of PCL point cloud processing (52)
論文寫作 19: 會議論文與期刊論文的區別
The R language uses the timeroc package to calculate the multi time AUC value of survival data without competitive risk, and uses the confint function to calculate the confidence interval value of mul
【目标跟踪】基于帧差法结合卡尔曼滤波实现行人姿态识别附matlab代码
How about Bohai futures. Is it safe to open futures accounts?
记录:调用mapper报空指针;<foreach>不去重的用法;
【问题解决】‘ascii‘ codec can‘t encode characters in position xx-xx: ordinal not in range(128)
Shanda Wangan shooting range experimental platform project - personal record (V)
R语言ggplot2可视化:ggplot2可视化散点图并使用geom_mark_ellipse函数在数据簇或数据分组的数据点周围添加椭圆进行注释
如何在BNB鏈上創建BEP-20通證
Electron入门教程4 —— 切换应用的主题
How to do product innovation—— Exploration of product innovation methodology I