profile pic



Exploiting DNS Protocol as a Covert Channel

Fuelled by the motivation to bypass paying for Wi-Fi at airports, people have found ways to exploit the DNS protocol which has allowed them to surf the web for free. Since then, there have been various approaches derived to exploit the DNS protocol through the attack technique of DNS Tunneling, particularly for data exfiltration. In this project, we perform an analysis on the state-of-the-art in DNS tunneling and explore the use of the TTL field as a carrier for covert channel communication.