5/16 (Thu.) 16:30 - 17:00 4F 4B

Tunneling and C2 over DNS: The Sneaky Backdoor You Didn't Know About

Apart from the extensively exploited HTTP protocol, the DNS protocol plays a crucial role in network communication, capable of bypassing Layer-4 firewall restrictions commonly employed by many organizations. This presentation will delve into the misuse of DNS for establishing covert tunnels, circumventing L4 firewalls. We will explore several tunneling tools and Command and Control (C2) frameworks, uncovering how threat actors leverage DNS for unauthorized network access. Our analysis reveals persistent DNS abuse as an effective attack vector employed by malicious entities over an extended period. The session will conclude with practical strategies to fortify DNS security, providing concrete steps to mitigate potential threats.

Hubert Lin
SPEAKER
Threat Labs Sr. Staff Threat Researcher
Netskope

TOPIC / TRACK
Threat Research Forum

LOCATION
Taipei Nangang Exhibition Center, Hall 2
4F 4B

LEVEL
Intermediate Intermediate sessions focus on cybersecurity architecture, tools, and practical applications, ideal for professionals with a basic understanding of cybersecurity.

SESSION TYPE
Breakout Session

LANGUAGE
Chinese

SUBTOPIC
DNS Security
Network Security
Firewall