Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. In today's episode of "Can It Run Doom": DNS fucking TXT records.

In today's episode of "Can It Run Doom": DNS fucking TXT records.

Scheduled Pinned Locked Moved Uncategorized
infosecdnsdoomitisalwaysdns
62 Posts 49 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

    In today's episode of "Can It Run Doom": DNS fucking TXT records.

    Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

    RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

    Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

    blog: https://blog.rice.is/post/doom-over-dns/

    repo: https://github.com/resumex/doom-over-dns

    Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

    It was always DNS.

    #infosec #dns #doom #itisalwaysdns

    dago@river.group.ltD This user is from outside of this forum
    dago@river.group.ltD This user is from outside of this forum
    dago@river.group.lt
    wrote last edited by
    #10

    @k3ym0 shit. Time to do Bad Apple on DNS.

    1 Reply Last reply
    0
    • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

      In today's episode of "Can It Run Doom": DNS fucking TXT records.

      Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

      RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

      Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

      blog: https://blog.rice.is/post/doom-over-dns/

      repo: https://github.com/resumex/doom-over-dns

      Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

      It was always DNS.

      #infosec #dns #doom #itisalwaysdns

      aris@infosec.exchangeA This user is from outside of this forum
      aris@infosec.exchangeA This user is from outside of this forum
      aris@infosec.exchange
      wrote last edited by
      #11

      @k3ym0 The concept is very old, I was using dns2tcp to have free wifi on plane trips in 2010 and even before during pentests. Long TXT replies trigger red alerts on most intrusion detection systems nowadays.

      1 Reply Last reply
      0
      • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

        In today's episode of "Can It Run Doom": DNS fucking TXT records.

        Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

        RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

        Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

        blog: https://blog.rice.is/post/doom-over-dns/

        repo: https://github.com/resumex/doom-over-dns

        Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

        It was always DNS.

        #infosec #dns #doom #itisalwaysdns

        nine@chitter.xyzN This user is from outside of this forum
        nine@chitter.xyzN This user is from outside of this forum
        nine@chitter.xyz
        wrote last edited by
        #12

        @k3ym0 now... can it do deathmatch over doom over dns? :3

        1 Reply Last reply
        0
        • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

          In today's episode of "Can It Run Doom": DNS fucking TXT records.

          Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

          RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

          Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

          blog: https://blog.rice.is/post/doom-over-dns/

          repo: https://github.com/resumex/doom-over-dns

          Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

          It was always DNS.

          #infosec #dns #doom #itisalwaysdns

          tml@mementomori.socialT This user is from outside of this forum
          tml@mementomori.socialT This user is from outside of this forum
          tml@mementomori.social
          wrote last edited by
          #13

          @k3ym0 For quite a loose definition of "run".

          1 Reply Last reply
          0
          • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

            In today's episode of "Can It Run Doom": DNS fucking TXT records.

            Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

            RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

            Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

            blog: https://blog.rice.is/post/doom-over-dns/

            repo: https://github.com/resumex/doom-over-dns

            Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

            It was always DNS.

            #infosec #dns #doom #itisalwaysdns

            wolf480pl@mstdn.ioW This user is from outside of this forum
            wolf480pl@mstdn.ioW This user is from outside of this forum
            wolf480pl@mstdn.io
            wrote last edited by
            #14

            @k3ym0
            > covert data exfil channel

            as if iodine wasn't already a thing

            1 Reply Last reply
            0
            • simondassow@masto.aiS simondassow@masto.ai

              @k3ym0 Doom Network Service 🎉

              k3ym0@infosec.exchangeK This user is from outside of this forum
              k3ym0@infosec.exchangeK This user is from outside of this forum
              k3ym0@infosec.exchange
              wrote last edited by
              #15

              @simondassow Doom-aaS?

              1 Reply Last reply
              0
              • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                In today's episode of "Can It Run Doom": DNS fucking TXT records.

                Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

                RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

                Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

                blog: https://blog.rice.is/post/doom-over-dns/

                repo: https://github.com/resumex/doom-over-dns

                Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

                It was always DNS.

                #infosec #dns #doom #itisalwaysdns

                da_667@infosec.exchangeD This user is from outside of this forum
                da_667@infosec.exchangeD This user is from outside of this forum
                da_667@infosec.exchange
                wrote last edited by
                #16

                @k3ym0 "good luck if you're not doing deep DNS inspection"

                iodine, dnscat, and literally every other DNS tunneling technique that has existed in the past 20-ish years: lol. lmao, even.

                Still, quite impressive, but saying this shit is a hard to detect covert channel is unmitigated bullshit.

                k3ym0@infosec.exchangeK 1 Reply Last reply
                0
                • da_667@infosec.exchangeD da_667@infosec.exchange

                  @k3ym0 "good luck if you're not doing deep DNS inspection"

                  iodine, dnscat, and literally every other DNS tunneling technique that has existed in the past 20-ish years: lol. lmao, even.

                  Still, quite impressive, but saying this shit is a hard to detect covert channel is unmitigated bullshit.

                  k3ym0@infosec.exchangeK This user is from outside of this forum
                  k3ym0@infosec.exchangeK This user is from outside of this forum
                  k3ym0@infosec.exchange
                  wrote last edited by
                  #17

                  @da_667 iodine and dnscat also have 20 years of signatures, known patterns, and detection logic baked into tooling. This doesn't.

                  But honestly that's beside the point. "Detectable" and "detected" are two very different sentences. iodine has been detectable for 20 years and I've watched it walk right out of enterprise networks that had no idea. Known technique != mature detection coverage in the median org.

                  SMB's are running Server 2008r2 with a Watchguard FW and a prayer. Mid-market is logging DNS at the firewall level and calling it done.

                  "Detectable in theory by a mature SOC" and "hard to detect in most real environments" are not mutually exclusive statements.

                  rx13@infosec.exchangeR davemwilburn@infosec.exchangeD 2 Replies Last reply
                  0
                  • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                    @da_667 iodine and dnscat also have 20 years of signatures, known patterns, and detection logic baked into tooling. This doesn't.

                    But honestly that's beside the point. "Detectable" and "detected" are two very different sentences. iodine has been detectable for 20 years and I've watched it walk right out of enterprise networks that had no idea. Known technique != mature detection coverage in the median org.

                    SMB's are running Server 2008r2 with a Watchguard FW and a prayer. Mid-market is logging DNS at the firewall level and calling it done.

                    "Detectable in theory by a mature SOC" and "hard to detect in most real environments" are not mutually exclusive statements.

                    rx13@infosec.exchangeR This user is from outside of this forum
                    rx13@infosec.exchangeR This user is from outside of this forum
                    rx13@infosec.exchange
                    wrote last edited by
                    #18

                    @k3ym0
                    @da_667

                    * Cries in DoH-allowed-networks *

                    da_667@infosec.exchangeD 1 Reply Last reply
                    0
                    • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                      In today's episode of "Can It Run Doom": DNS fucking TXT records.

                      Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

                      RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

                      Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

                      blog: https://blog.rice.is/post/doom-over-dns/

                      repo: https://github.com/resumex/doom-over-dns

                      Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

                      It was always DNS.

                      #infosec #dns #doom #itisalwaysdns

                      albirew@soshar.dess.gaA This user is from outside of this forum
                      albirew@soshar.dess.gaA This user is from outside of this forum
                      albirew@soshar.dess.ga
                      wrote last edited by
                      #19
                      @k3ym0@infosec.exchange DNS haiku just got a lot bloodier...
                      1 Reply Last reply
                      0
                      • rx13@infosec.exchangeR rx13@infosec.exchange

                        @k3ym0
                        @da_667

                        * Cries in DoH-allowed-networks *

                        da_667@infosec.exchangeD This user is from outside of this forum
                        da_667@infosec.exchangeD This user is from outside of this forum
                        da_667@infosec.exchange
                        wrote last edited by
                        #20

                        @rx13 @k3ym0

                        /point
                        /laugh

                        1 Reply Last reply
                        0
                        • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                          In today's episode of "Can It Run Doom": DNS fucking TXT records.

                          Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

                          RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

                          Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

                          blog: https://blog.rice.is/post/doom-over-dns/

                          repo: https://github.com/resumex/doom-over-dns

                          Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

                          It was always DNS.

                          #infosec #dns #doom #itisalwaysdns

                          karlauerbach@sfba.socialK This user is from outside of this forum
                          karlauerbach@sfba.socialK This user is from outside of this forum
                          karlauerbach@sfba.social
                          wrote last edited by
                          #21

                          @k3ym0 I used to have the entire text of the Magna Carta in TXT records in a subdomain.

                          Even during the early 1990's on the Interop show networks we discovered people streaming lewd stuff via DNS-looking UDP packets.

                          (Another channel that we used, but it only works on a LAN, is to use the space between the end of a short IP packet and the end of the enclosing Ethernet frame. [Short IP packets are smaller than the minimum size of Ethernet frames.] This was largely used for license key exchanges.)

                          1 Reply Last reply
                          0
                          • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                            @da_667 iodine and dnscat also have 20 years of signatures, known patterns, and detection logic baked into tooling. This doesn't.

                            But honestly that's beside the point. "Detectable" and "detected" are two very different sentences. iodine has been detectable for 20 years and I've watched it walk right out of enterprise networks that had no idea. Known technique != mature detection coverage in the median org.

                            SMB's are running Server 2008r2 with a Watchguard FW and a prayer. Mid-market is logging DNS at the firewall level and calling it done.

                            "Detectable in theory by a mature SOC" and "hard to detect in most real environments" are not mutually exclusive statements.

                            davemwilburn@infosec.exchangeD This user is from outside of this forum
                            davemwilburn@infosec.exchangeD This user is from outside of this forum
                            davemwilburn@infosec.exchange
                            wrote last edited by
                            #22

                            @k3ym0 @da_667

                            Yeah, I tend to agree with this take. Reliably catching techniques like DNS tunneling, DGA, etc., looks trivial until you try it on noisy real world networks with all sorts of idiosyncratic constraints, and also when you realize that what we consider "trivial" is often considered "impractical" or "impossible" for most real world orgs.

                            da_667@infosec.exchangeD 1 Reply Last reply
                            0
                            • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                              In today's episode of "Can It Run Doom": DNS fucking TXT records.

                              Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

                              RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

                              Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

                              blog: https://blog.rice.is/post/doom-over-dns/

                              repo: https://github.com/resumex/doom-over-dns

                              Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

                              It was always DNS.

                              #infosec #dns #doom #itisalwaysdns

                              ck0@tech.lgbtC This user is from outside of this forum
                              ck0@tech.lgbtC This user is from outside of this forum
                              ck0@tech.lgbt
                              wrote last edited by
                              #23

                              @k3ym0 "Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well."

                              Doesn't work anymore for a decade. Most serious companies don't allow DNS queries to servers outside of their network. The only endpoints allowed to do that are the corporate internal DNS.
                              With DoH I'm also not sure that will work because of the corporate web proxy.

                              To make data exfiltrations there are so many easy ways to do so ... Why spending time to make something over DNS when you can simply upload the files or exploit USB keys, it's not hard to bypass FW and EDR policies.

                              k3ym0@infosec.exchangeK 1 Reply Last reply
                              0
                              • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                                In today's episode of "Can It Run Doom": DNS fucking TXT records.

                                Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

                                RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

                                Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

                                blog: https://blog.rice.is/post/doom-over-dns/

                                repo: https://github.com/resumex/doom-over-dns

                                Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

                                It was always DNS.

                                #infosec #dns #doom #itisalwaysdns

                                jawnsy@mastodon.socialJ This user is from outside of this forum
                                jawnsy@mastodon.socialJ This user is from outside of this forum
                                jawnsy@mastodon.social
                                wrote last edited by
                                #24

                                @k3ym0 This post is wild but the stuff people are sharing in the comments is great hahaha

                                1 Reply Last reply
                                0
                                • davemwilburn@infosec.exchangeD davemwilburn@infosec.exchange

                                  @k3ym0 @da_667

                                  Yeah, I tend to agree with this take. Reliably catching techniques like DNS tunneling, DGA, etc., looks trivial until you try it on noisy real world networks with all sorts of idiosyncratic constraints, and also when you realize that what we consider "trivial" is often considered "impractical" or "impossible" for most real world orgs.

                                  da_667@infosec.exchangeD This user is from outside of this forum
                                  da_667@infosec.exchangeD This user is from outside of this forum
                                  da_667@infosec.exchange
                                  wrote last edited by
                                  #25

                                  @DaveMWilburn @k3ym0 I'm well aware that trying to base your detection on shannon entropy is an exercise in futility, as most cloud providers have the "malware to ops DGA that looks like its very malicious" down pat. But I will still say, if you suddenly are getting assloads of TXT records with the same domain in common, so long as you have DNS logs at all, you can probably do some form of statistical analysis and notice that this number of DNS TXT records from one place looks really fucking jank.

                                  da_667@infosec.exchangeD jornane@ipv6.socialJ 2 Replies Last reply
                                  0
                                  • da_667@infosec.exchangeD da_667@infosec.exchange

                                    @DaveMWilburn @k3ym0 I'm well aware that trying to base your detection on shannon entropy is an exercise in futility, as most cloud providers have the "malware to ops DGA that looks like its very malicious" down pat. But I will still say, if you suddenly are getting assloads of TXT records with the same domain in common, so long as you have DNS logs at all, you can probably do some form of statistical analysis and notice that this number of DNS TXT records from one place looks really fucking jank.

                                    da_667@infosec.exchangeD This user is from outside of this forum
                                    da_667@infosec.exchangeD This user is from outside of this forum
                                    da_667@infosec.exchange
                                    wrote last edited by
                                    #26

                                    @DaveMWilburn @k3ym0 I'm also somewhat aware that, there are some services that use TXT records for validation (SPF), and I've heard that some apple services use them for their messenger programs. I've also seen Sophos doing incredibly dumb things with TXT records, but my point still stands is that if you have any capacity for DNS logs, then shit like this sticks out like a sore thumb.

                                    However, I can acknowledge my experiences and yours are two different things. Thats fine. I can be wrong.

                                    johntimaeus@infosec.exchangeJ 1 Reply Last reply
                                    0
                                    • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                                      In today's episode of "Can It Run Doom": DNS fucking TXT records.

                                      Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

                                      RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

                                      Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

                                      blog: https://blog.rice.is/post/doom-over-dns/

                                      repo: https://github.com/resumex/doom-over-dns

                                      Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

                                      It was always DNS.

                                      #infosec #dns #doom #itisalwaysdns

                                      poetaster@mastodon.gamedev.placeP This user is from outside of this forum
                                      poetaster@mastodon.gamedev.placeP This user is from outside of this forum
                                      poetaster@mastodon.gamedev.place
                                      wrote last edited by
                                      #27

                                      @k3ym0 Jeez. We were abusing DNS as http proxy caches in 1993. Some people were doing chat over DNS. Some of them WERE the engineers who were involved in standardization.

                                      1 Reply Last reply
                                      0
                                      • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                                        In today's episode of "Can It Run Doom": DNS fucking TXT records.

                                        Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

                                        RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

                                        Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

                                        blog: https://blog.rice.is/post/doom-over-dns/

                                        repo: https://github.com/resumex/doom-over-dns

                                        Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

                                        It was always DNS.

                                        #infosec #dns #doom #itisalwaysdns

                                        M This user is from outside of this forum
                                        M This user is from outside of this forum
                                        methylzero@mast.hpc.social
                                        wrote last edited by
                                        #28

                                        @k3ym0 I have always wondered where the "power source" they are tapping Hell for in DOOM came from. Turns out it was the DNS engineers engineers spinning in their graves all along.

                                        1 Reply Last reply
                                        0
                                        • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                                          In today's episode of "Can It Run Doom": DNS fucking TXT records.

                                          Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

                                          RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

                                          Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

                                          blog: https://blog.rice.is/post/doom-over-dns/

                                          repo: https://github.com/resumex/doom-over-dns

                                          Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

                                          It was always DNS.

                                          #infosec #dns #doom #itisalwaysdns

                                          retrofan64@oldbytes.spaceR This user is from outside of this forum
                                          retrofan64@oldbytes.spaceR This user is from outside of this forum
                                          retrofan64@oldbytes.space
                                          wrote last edited by
                                          #29

                                          @k3ym0 this is similar to how DeCSS (DVD decryption code) was distributed over 25 years ago when there was an attempt to suppress it online.

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups