Loading...

DNS Shell – Tool to Compromise and Maintain Control Over Victim Machine

In Summary : DNS protocol runs on the application layer of TCP/IP Model. When an attacker or pentester tries to exploit DNS with RCE vuln...

In Summary :

DNS protocol runs on the application layer of TCP/IP Model. When an attacker or pentester tries to exploit DNS with RCE vulnerability (Remote Command Execution) destination server acts as the backdoor. DNS Shell Tool is python based Exploitation tool to compromise and also maintaining the access via command and control to the server. Must Read Complete Kali Tools tutorials from [...]

kindly refer the following link as follow up :
https://gbhackers.com/dns-shell-command-control-dns/

Post a Comment

emo-but-icon

Home item

ADS

Popular Posts

Random Posts

Flickr Photo

StatCounter

View My Stats