Refer to the exhibit.
Which security issue is possibly indicated by this traffic capture?
DNS tunneling is a technique that abuses the DNS protocol to tunnel data or commands between a compromised host and an attacker's server.DNS tunneling can be used to establish a command and control channel, which allows the attacker to remotely control the malware or exfiltrate data from the infected host1
The traffic capture in the exhibit shows some signs of DNS tunneling. The source IP address is 10.1.7.2, which is likely an internal host behind a firewall. The destination IP address is 8.8.8.8, which is a public DNS resolver. The DNS queries are for subdomains of badsite.com, which is likely a malicious domain registered by the attacker. The subdomains have long and random names, such as 0x2a0x2a0x2a0x2a0x2a0x2a0x2a0x2a.badsite.com, which could be used to encode data or commands.The DNS responses have large sizes, such as 512 bytes, which could be used to carry data or commands back to the host2
Limited Time Offer
25%
Off
Leota
6 months agoLashonda
6 months agoDominque
6 months agoGeraldo
6 months agoBritt
7 months ago