DNS Shell – Tool to Compromise and Maintain Control Over Victim Machine
DNS protocol runs on the application layer of the TCP/IP Model. When an attacker or pentester tries to exploit DNS with RCE vulnerability (Remote Command Execution) destination server acts as the backdoor.
DNS Shell Tool is a python based Exploitation tool to compromise and also maintaining the access via command and control to the server.
Here I have used Kali Linux(Attacker Machine) and Victim Machine (Windows 10)
ATTACKER MACHINE
- Download the DNS SHELL tool HERE
- Execute the command: python DNS-SHELL.py
- It can be utilized with different modes, Recursive mode (It will run the DNS name) and Direct mode will run as Ip address provided (Kali Linux IP)