sensepost/DNS-Shell: DNS-Shell is an interactive Shell over DNS channel
2019-03-15 00:53:46 Author: github.com(查看原文) 阅读量:205 收藏

Join GitHub today

GitHub is home to over 31 million developers working together to host and review code, manage projects, and build software together.

Sign up

DNS-Shell is an interactive Shell over DNS channel

DNS-Shell is an interactive Shell over DNS channel. The server is Python based and can run on any operating system that has python installed, the payload is an encoded PowerShell command.

Understanding DNS-Shell

The Payload is generated when the sever script is invoked and it simply utilizes nslookup to perform the queries and query the server for new commands the server then listens on port 53 for incoming communications, once payload is executed on the target machine the server will spawn an interactive shell.

Once the channel is established the payload will continously query the server for commands if a new command is entered, it will execute it and return the result back to the server.

Using DNS-Shell

Running DNS-Shell is relatively simple

DNS-Shell supports two mode of operations direct and recursive modes:

  • Perform a git clone from our DNS-shell Github page
  • DNS-Shell direct mode: sudo python DNS-Shell.py -l -d [Server IP]
  • DNS-Shell recursive mode: sudo python DNS-Shell.py -l -r [Domain]

文章来源: https://github.com/sensepost/DNS-Shell
如有侵权请联系:admin#unsafe.sh