Refer to the exhibit.
Which security issue is possibly indicated by this traffic capture?
DNS tunneling is a technique that abuses the DNS protocol to tunnel data or commands between a compromised host and an attacker's server.DNS tunneling can be used to establish a command and control channel, which allows the attacker to remotely control the malware or exfiltrate data from the infected host1
The traffic capture in the exhibit shows some signs of DNS tunneling. The source IP address is 10.1.7.2, which is likely an internal host behind a firewall. The destination IP address is 8.8.8.8, which is a public DNS resolver. The DNS queries are for subdomains of badsite.com, which is likely a malicious domain registered by the attacker. The subdomains have long and random names, such as 0x2a0x2a0x2a0x2a0x2a0x2a0x2a0x2a.badsite.com, which could be used to encode data or commands.The DNS responses have large sizes, such as 512 bytes, which could be used to carry data or commands back to the host2
Limited Time Offer
25%
Off
Leota
10 months agoLashonda
10 months agoDominque
10 months agoGeraldo
11 months agoBritt
11 months ago