
Sign up to save your podcasts
Or


🧦 SOC Summit 2026
https://www.antisyphontraining.com/event/soc-summit/
Are attackers hiding in your DNS traffic right now?
🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits –Â
https://poweredbybhis.com
Join instructor Faan Rossouw for a free one-hour training on hunting malware that uses DNS as a covert communication channel.
C2 frameworks, RATs, and backdoors frequently exploit DNS to stay hidden - sometimes for months. High-profile attacks like SolarWinds' Sunburst demonstrate just how devastating undetected DNS exfiltration can be.
This Antisyphon Anti-Cast focuses on behavior-based threat hunting techniques that go beyond signatures to uncover suspicious DNS activity attackers think they've hidden.
You'll learn how to:
* Recognize network artifacts that DNS tunneling produces
* Identify anomalies in DNS record types that signal malicious use
* Leverage open-source tools like Zeek, RITA, and Sysmon to detect malware abusing DNS
* Build detection strategies that make it very hard for DNS-based threats to remain hidden
If you're ready to stop trusting DNS and start verifying it, this session will give you the practical skills to hunt what's lurking in your network.
Chapters:
Black Hills Information SecurityÂ
https://www.blackhillsinfosec.com
Antisyphon Training
https://www.antisyphontraining.com/
Active Countermeasures
https://www.activecountermeasures.com
Wild West Hackin Fest
https://wildwesthackinfest.com
Click here to view the episode transcript.
By Antisyphon Training🧦 SOC Summit 2026
https://www.antisyphontraining.com/event/soc-summit/
Are attackers hiding in your DNS traffic right now?
🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits –Â
https://poweredbybhis.com
Join instructor Faan Rossouw for a free one-hour training on hunting malware that uses DNS as a covert communication channel.
C2 frameworks, RATs, and backdoors frequently exploit DNS to stay hidden - sometimes for months. High-profile attacks like SolarWinds' Sunburst demonstrate just how devastating undetected DNS exfiltration can be.
This Antisyphon Anti-Cast focuses on behavior-based threat hunting techniques that go beyond signatures to uncover suspicious DNS activity attackers think they've hidden.
You'll learn how to:
* Recognize network artifacts that DNS tunneling produces
* Identify anomalies in DNS record types that signal malicious use
* Leverage open-source tools like Zeek, RITA, and Sysmon to detect malware abusing DNS
* Build detection strategies that make it very hard for DNS-based threats to remain hidden
If you're ready to stop trusting DNS and start verifying it, this session will give you the practical skills to hunt what's lurking in your network.
Chapters:
Black Hills Information SecurityÂ
https://www.blackhillsinfosec.com
Antisyphon Training
https://www.antisyphontraining.com/
Active Countermeasures
https://www.activecountermeasures.com
Wild West Hackin Fest
https://wildwesthackinfest.com
Click here to view the episode transcript.