Using DNS as C2 Communication - Evasive Techniques (Part 3)

1 · Dimitar Ganev · Oct. 26, 2022, 5:45 p.m.
Series Dynamic Linker Hijacking Experiments - Evasive Techniques (Part 1) Dynamic Linker Hijacking Experiments - Evasive Techniques (Part 2) (this one) Overview Following my last post about some evasion techniques that the Symbiote uses which I tried to recreate in their simplest form, this post will see how the Symbiote is communicating to the command and control C2 server. Upon reading the article, we can see that the Symbiote uses the DNS Protocol to exfiltrate data out of the inf...