Antisyphon Training Anticasts

Threat Hunting Malware Communication over DNS


Listen Later

Are attackers hiding in your DNS traffic right now?

🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits – 

https://poweredbybhis.com

Chapters

  • (00:00) - Intro - Threat Hunting Malware Communication over DNS
  • (00:42) - Introducing Faan
  • (02:17) - Threat Hunting C2 Over DNS
  • (03:49) - Threat Hunting - What is it and why is it awesome?
  • (05:31) - Assumed Compromise
  • (06:44) - David J. Bianco – Pyramid of Pain Guy
  • (13:17) - C2 Over DNS
  • (27:52) - TXT Record Abuse
  • (32:35) - Null Record
  • (34:56) - CNAME, MX, SRV… Oh my
  • (38:15) - DNS Sandwhich
  • (42:37) - ID Field Missuse
  • (48:47) - EDNS0
  • (52:22) - Encrypted DNS
  • (55:04) - Main Takeaway
  • (56:03) - The Workshop: Build a Reflective Shellcode Loader C2 in Golang
  • (57:40) - Q&A Start
  • (01:00:04) - DNS and Splunk?
  • (01:01:37) - Suggestions for Detecting DGA?
  • (01:03:14) - Offensive Security Tooling from a Threat Hunter Perspective
  • (01:07:16) - Restrict outbound DNS to protect against C2?
  • (01:08:55) - Communicating the value of Threat Hunting to Higher Ups.
  • (01:13:38) - Closing Remarks


  • Join instructor Faan Rossouw for a free one-hour training on hunting malware that uses DNS as a covert communication channel.

    C2 frameworks, RATs, and backdoors frequently exploit DNS to stay hidden - sometimes for months. High-profile attacks like SolarWinds' Sunburst demonstrate just how devastating undetected DNS exfiltration can be.

    This Antisyphon Anti-Cast focuses on behavior-based threat hunting techniques that go beyond signatures to uncover suspicious DNS activity attackers think they've hidden.

    You'll learn how to:
    * Recognize network artifacts that DNS tunneling produces
    * Identify anomalies in DNS record types that signal malicious use
    * Leverage open-source tools like Zeek, RITA, and Sysmon to detect malware abusing DNS
    * Build detection strategies that make it very hard for DNS-based threats to remain hidden

    If you're ready to stop trusting DNS and start verifying it, this session will give you the practical skills to hunt what's lurking in your network.


    Brought to you by:

    Black Hills Information Security 

    https://www.blackhillsinfosec.com


    Antisyphon Training

    https://www.antisyphontraining.com/


    Active Countermeasures

    https://www.activecountermeasures.com


    Wild West Hackin Fest

    https://wildwesthackinfest.com

    ...more
    View all episodesView all episodes
    Download on the App Store

    Antisyphon Training AnticastsBy Antisyphon Training