Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. In today's episode of "Can It Run Doom": DNS fucking TXT records.

In today's episode of "Can It Run Doom": DNS fucking TXT records.

Scheduled Pinned Locked Moved Uncategorized
infosecdnsdoomitisalwaysdns
62 Posts 49 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • davemwilburn@infosec.exchangeD davemwilburn@infosec.exchange

    @k3ym0 @da_667

    Yeah, I tend to agree with this take. Reliably catching techniques like DNS tunneling, DGA, etc., looks trivial until you try it on noisy real world networks with all sorts of idiosyncratic constraints, and also when you realize that what we consider "trivial" is often considered "impractical" or "impossible" for most real world orgs.

    da_667@infosec.exchangeD This user is from outside of this forum
    da_667@infosec.exchangeD This user is from outside of this forum
    da_667@infosec.exchange
    wrote last edited by
    #25

    @DaveMWilburn @k3ym0 I'm well aware that trying to base your detection on shannon entropy is an exercise in futility, as most cloud providers have the "malware to ops DGA that looks like its very malicious" down pat. But I will still say, if you suddenly are getting assloads of TXT records with the same domain in common, so long as you have DNS logs at all, you can probably do some form of statistical analysis and notice that this number of DNS TXT records from one place looks really fucking jank.

    da_667@infosec.exchangeD jornane@ipv6.socialJ 2 Replies Last reply
    0
    • da_667@infosec.exchangeD da_667@infosec.exchange

      @DaveMWilburn @k3ym0 I'm well aware that trying to base your detection on shannon entropy is an exercise in futility, as most cloud providers have the "malware to ops DGA that looks like its very malicious" down pat. But I will still say, if you suddenly are getting assloads of TXT records with the same domain in common, so long as you have DNS logs at all, you can probably do some form of statistical analysis and notice that this number of DNS TXT records from one place looks really fucking jank.

      da_667@infosec.exchangeD This user is from outside of this forum
      da_667@infosec.exchangeD This user is from outside of this forum
      da_667@infosec.exchange
      wrote last edited by
      #26

      @DaveMWilburn @k3ym0 I'm also somewhat aware that, there are some services that use TXT records for validation (SPF), and I've heard that some apple services use them for their messenger programs. I've also seen Sophos doing incredibly dumb things with TXT records, but my point still stands is that if you have any capacity for DNS logs, then shit like this sticks out like a sore thumb.

      However, I can acknowledge my experiences and yours are two different things. Thats fine. I can be wrong.

      johntimaeus@infosec.exchangeJ 1 Reply Last reply
      0
      • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

        In today's episode of "Can It Run Doom": DNS fucking TXT records.

        Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

        RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

        Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

        blog: https://blog.rice.is/post/doom-over-dns/

        repo: https://github.com/resumex/doom-over-dns

        Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

        It was always DNS.

        #infosec #dns #doom #itisalwaysdns

        poetaster@mastodon.gamedev.placeP This user is from outside of this forum
        poetaster@mastodon.gamedev.placeP This user is from outside of this forum
        poetaster@mastodon.gamedev.place
        wrote last edited by
        #27

        @k3ym0 Jeez. We were abusing DNS as http proxy caches in 1993. Some people were doing chat over DNS. Some of them WERE the engineers who were involved in standardization.

        1 Reply Last reply
        0
        • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

          In today's episode of "Can It Run Doom": DNS fucking TXT records.

          Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

          RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

          Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

          blog: https://blog.rice.is/post/doom-over-dns/

          repo: https://github.com/resumex/doom-over-dns

          Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

          It was always DNS.

          #infosec #dns #doom #itisalwaysdns

          M This user is from outside of this forum
          M This user is from outside of this forum
          methylzero@mast.hpc.social
          wrote last edited by
          #28

          @k3ym0 I have always wondered where the "power source" they are tapping Hell for in DOOM came from. Turns out it was the DNS engineers engineers spinning in their graves all along.

          1 Reply Last reply
          0
          • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

            In today's episode of "Can It Run Doom": DNS fucking TXT records.

            Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

            RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

            Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

            blog: https://blog.rice.is/post/doom-over-dns/

            repo: https://github.com/resumex/doom-over-dns

            Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

            It was always DNS.

            #infosec #dns #doom #itisalwaysdns

            retrofan64@oldbytes.spaceR This user is from outside of this forum
            retrofan64@oldbytes.spaceR This user is from outside of this forum
            retrofan64@oldbytes.space
            wrote last edited by
            #29

            @k3ym0 this is similar to how DeCSS (DVD decryption code) was distributed over 25 years ago when there was an attempt to suppress it online.

            1 Reply Last reply
            0
            • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

              In today's episode of "Can It Run Doom": DNS fucking TXT records.

              Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

              RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

              Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

              blog: https://blog.rice.is/post/doom-over-dns/

              repo: https://github.com/resumex/doom-over-dns

              Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

              It was always DNS.

              #infosec #dns #doom #itisalwaysdns

              gloriouscow@oldbytes.spaceG This user is from outside of this forum
              gloriouscow@oldbytes.spaceG This user is from outside of this forum
              gloriouscow@oldbytes.space
              wrote last edited by
              #30

              @k3ym0 Not DOOM, but this has been one of Infoblox's favorite sales demos for ages.

              "Check out all this information we can exfiltrate from your network directly from a web browser via only DNS queries" always gets people's attention

              1 Reply Last reply
              0
              • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                In today's episode of "Can It Run Doom": DNS fucking TXT records.

                Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

                RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

                Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

                blog: https://blog.rice.is/post/doom-over-dns/

                repo: https://github.com/resumex/doom-over-dns

                Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

                It was always DNS.

                #infosec #dns #doom #itisalwaysdns

                memdmp@catgirl.centerM This user is from outside of this forum
                memdmp@catgirl.centerM This user is from outside of this forum
                memdmp@catgirl.center
                wrote last edited by
                #31

                @k3ym0@infosec.exchange oh we may be able to make it worse...doom via standards-compliant dns direct content serving (assuming https://datatracker.ietf.org/doc/draft-dns-content-delivery/ goes through)

                1 Reply Last reply
                0
                • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                  In today's episode of "Can It Run Doom": DNS fucking TXT records.

                  Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

                  RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

                  Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

                  blog: https://blog.rice.is/post/doom-over-dns/

                  repo: https://github.com/resumex/doom-over-dns

                  Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

                  It was always DNS.

                  #infosec #dns #doom #itisalwaysdns

                  spara@mastodon.socialS This user is from outside of this forum
                  spara@mastodon.socialS This user is from outside of this forum
                  spara@mastodon.social
                  wrote last edited by
                  #32

                  @k3ym0 I was at Defcon 12 when Kaminsky demoed sending voice over DNS. Glad to see the tradition continue.

                  1 Reply Last reply
                  0
                  • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                    In today's episode of "Can It Run Doom": DNS fucking TXT records.

                    Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

                    RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

                    Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

                    blog: https://blog.rice.is/post/doom-over-dns/

                    repo: https://github.com/resumex/doom-over-dns

                    Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

                    It was always DNS.

                    #infosec #dns #doom #itisalwaysdns

                    littlealex@infosec.exchangeL This user is from outside of this forum
                    littlealex@infosec.exchangeL This user is from outside of this forum
                    littlealex@infosec.exchange
                    wrote last edited by
                    #33

                    @k3ym0 interesting vector to deploy malware

                    1 Reply Last reply
                    0
                    • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                      In today's episode of "Can It Run Doom": DNS fucking TXT records.

                      Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

                      RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

                      Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

                      blog: https://blog.rice.is/post/doom-over-dns/

                      repo: https://github.com/resumex/doom-over-dns

                      Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

                      It was always DNS.

                      #infosec #dns #doom #itisalwaysdns

                      woe2you@beige.partyW This user is from outside of this forum
                      woe2you@beige.partyW This user is from outside of this forum
                      woe2you@beige.party
                      wrote last edited by
                      #34

                      @k3ym0 Think of all the times you've wanted to take a shotgun to DNS. Now you can. Or a chainsaw.

                      1 Reply Last reply
                      0
                      • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                        In today's episode of "Can It Run Doom": DNS fucking TXT records.

                        Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

                        RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

                        Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

                        blog: https://blog.rice.is/post/doom-over-dns/

                        repo: https://github.com/resumex/doom-over-dns

                        Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

                        It was always DNS.

                        #infosec #dns #doom #itisalwaysdns

                        pseudonym@mastodon.onlineP This user is from outside of this forum
                        pseudonym@mastodon.onlineP This user is from outside of this forum
                        pseudonym@mastodon.online
                        wrote last edited by
                        #35

                        @k3ym0

                        DNS: "Tell them it was me."

                        Link Preview Image
                        Always Has Been

                        An Always Has Been meme. Caption your own images or memes with our Meme Generator.

                        favicon

                        Imgflip (imgflip.com)

                        1 Reply Last reply
                        0
                        • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                          In today's episode of "Can It Run Doom": DNS fucking TXT records.

                          Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

                          RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

                          Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

                          blog: https://blog.rice.is/post/doom-over-dns/

                          repo: https://github.com/resumex/doom-over-dns

                          Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

                          It was always DNS.

                          #infosec #dns #doom #itisalwaysdns

                          colinstu@birdbutt.comC This user is from outside of this forum
                          colinstu@birdbutt.comC This user is from outside of this forum
                          colinstu@birdbutt.com
                          wrote last edited by
                          #36

                          @k3ym0 DOOM over DNS, never thought I'd see the day.

                          1 Reply Last reply
                          0
                          • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                            In today's episode of "Can It Run Doom": DNS fucking TXT records.

                            Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

                            RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

                            Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

                            blog: https://blog.rice.is/post/doom-over-dns/

                            repo: https://github.com/resumex/doom-over-dns

                            Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

                            It was always DNS.

                            #infosec #dns #doom #itisalwaysdns

                            eeveeeuphoria@social.translunar.academyE This user is from outside of this forum
                            eeveeeuphoria@social.translunar.academyE This user is from outside of this forum
                            eeveeeuphoria@social.translunar.academy
                            wrote last edited by
                            #37
                            @k3ym0 in today's episode of "this is lazy ai vibe-coded slop":
                            Link Preview ImageLink Preview Image
                            kimapr@ublog.kimapr.netK flesh@transfem.socialF colinstu@birdbutt.comC 3 Replies Last reply
                            0
                            • eeveeeuphoria@social.translunar.academyE eeveeeuphoria@social.translunar.academy
                              @k3ym0 in today's episode of "this is lazy ai vibe-coded slop":
                              Link Preview ImageLink Preview Image
                              kimapr@ublog.kimapr.netK This user is from outside of this forum
                              kimapr@ublog.kimapr.netK This user is from outside of this forum
                              kimapr@ublog.kimapr.net
                              wrote last edited by
                              #38

                              @EeveeEuphoria@translunar.academy @k3ym0@infosec.exchange when i don't know C# i go to msdn.microsoft.com and figure things out instead of doing anything i can to avoid learning. Kids these days 🙄

                              1 Reply Last reply
                              0
                              • eeveeeuphoria@social.translunar.academyE eeveeeuphoria@social.translunar.academy
                                @k3ym0 in today's episode of "this is lazy ai vibe-coded slop":
                                Link Preview ImageLink Preview Image
                                flesh@transfem.socialF This user is from outside of this forum
                                flesh@transfem.socialF This user is from outside of this forum
                                flesh@transfem.social
                                wrote last edited by
                                #39

                                @EeveeEuphoria@social.translunar.academy @k3ym0@infosec.exchange Screams and fades into dust.

                                1 Reply Last reply
                                0
                                • eeveeeuphoria@social.translunar.academyE eeveeeuphoria@social.translunar.academy
                                  @k3ym0 in today's episode of "this is lazy ai vibe-coded slop":
                                  Link Preview ImageLink Preview Image
                                  colinstu@birdbutt.comC This user is from outside of this forum
                                  colinstu@birdbutt.comC This user is from outside of this forum
                                  colinstu@birdbutt.com
                                  wrote last edited by
                                  #40

                                  @EeveeEuphoria oh noooo 😭

                                  1 Reply Last reply
                                  0
                                  • tarix29@tech.lgbtT tarix29@tech.lgbt

                                    @k3ym0 you may already know this, but on a related note you can tunnel basically any IPv4 traffic over DNS: https://code.kryo.se/iodine/

                                    jbaert@mastodon.socialJ This user is from outside of this forum
                                    jbaert@mastodon.socialJ This user is from outside of this forum
                                    jbaert@mastodon.social
                                    wrote last edited by
                                    #41

                                    @tarix29 @k3ym0 we used this in uni when data caps were reached... but dns resolves were still allowed 🙂

                                    1 Reply Last reply
                                    0
                                    • ck0@tech.lgbtC ck0@tech.lgbt

                                      @k3ym0 "Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well."

                                      Doesn't work anymore for a decade. Most serious companies don't allow DNS queries to servers outside of their network. The only endpoints allowed to do that are the corporate internal DNS.
                                      With DoH I'm also not sure that will work because of the corporate web proxy.

                                      To make data exfiltrations there are so many easy ways to do so ... Why spending time to make something over DNS when you can simply upload the files or exploit USB keys, it's not hard to bypass FW and EDR policies.

                                      k3ym0@infosec.exchangeK This user is from outside of this forum
                                      k3ym0@infosec.exchangeK This user is from outside of this forum
                                      k3ym0@infosec.exchange
                                      wrote last edited by
                                      #42

                                      @ck0

                                      Most serious companies don't allow DNS queries to servers outside of their network.

                                      Oh my sweet, sweet, child. If only this were true. I could name-drop several multi-billion $ enterprise orgs that still don’t do this.

                                      johntimaeus@infosec.exchangeJ 1 Reply Last reply
                                      0
                                      • kajer@infosec.exchangeK kajer@infosec.exchange

                                        @k3ym0 big DNSFS energy

                                        Link Preview Image
                                        DNSFS. Store your files in others DNS resolver caches

                                        favicon

                                        (blog.benjojo.co.uk)

                                        yuvalne@433.worldY This user is from outside of this forum
                                        yuvalne@433.worldY This user is from outside of this forum
                                        yuvalne@433.world
                                        wrote last edited by
                                        #43

                                        @kajer @k3ym0 i was thinking of BookmarkFS
                                        https://github.com/velzie/bookmarkfs

                                        1 Reply Last reply
                                        0
                                        • benaveling@infosec.exchangeB This user is from outside of this forum
                                          benaveling@infosec.exchangeB This user is from outside of this forum
                                          benaveling@infosec.exchange
                                          wrote last edited by
                                          #44

                                          DNS outbound tends to be allowed even when other protocols are not. If you run your own DNS server you can use DNS to tunnel any traffic you want. @sabik @arichtman @k3ym0

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups