Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. In today's episode of "Can It Run Doom": DNS fucking TXT records.

In today's episode of "Can It Run Doom": DNS fucking TXT records.

Scheduled Pinned Locked Moved Uncategorized
infosecdnsdoomitisalwaysdns
62 Posts 49 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

    In today's episode of "Can It Run Doom": DNS fucking TXT records.

    Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

    RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

    Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

    blog: https://blog.rice.is/post/doom-over-dns/

    repo: https://github.com/resumex/doom-over-dns

    Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

    It was always DNS.

    #infosec #dns #doom #itisalwaysdns

    colinstu@birdbutt.comC This user is from outside of this forum
    colinstu@birdbutt.comC This user is from outside of this forum
    colinstu@birdbutt.com
    wrote last edited by
    #36

    @k3ym0 DOOM over DNS, never thought I'd see the day.

    1 Reply Last reply
    0
    • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

      In today's episode of "Can It Run Doom": DNS fucking TXT records.

      Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

      RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

      Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

      blog: https://blog.rice.is/post/doom-over-dns/

      repo: https://github.com/resumex/doom-over-dns

      Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

      It was always DNS.

      #infosec #dns #doom #itisalwaysdns

      eeveeeuphoria@social.translunar.academyE This user is from outside of this forum
      eeveeeuphoria@social.translunar.academyE This user is from outside of this forum
      eeveeeuphoria@social.translunar.academy
      wrote last edited by
      #37
      @k3ym0 in today's episode of "this is lazy ai vibe-coded slop":
      Link Preview ImageLink Preview Image
      kimapr@ublog.kimapr.netK flesh@transfem.socialF colinstu@birdbutt.comC 3 Replies Last reply
      0
      • eeveeeuphoria@social.translunar.academyE eeveeeuphoria@social.translunar.academy
        @k3ym0 in today's episode of "this is lazy ai vibe-coded slop":
        Link Preview ImageLink Preview Image
        kimapr@ublog.kimapr.netK This user is from outside of this forum
        kimapr@ublog.kimapr.netK This user is from outside of this forum
        kimapr@ublog.kimapr.net
        wrote last edited by
        #38

        @EeveeEuphoria@translunar.academy @k3ym0@infosec.exchange when i don't know C# i go to msdn.microsoft.com and figure things out instead of doing anything i can to avoid learning. Kids these days 🙄

        1 Reply Last reply
        0
        • eeveeeuphoria@social.translunar.academyE eeveeeuphoria@social.translunar.academy
          @k3ym0 in today's episode of "this is lazy ai vibe-coded slop":
          Link Preview ImageLink Preview Image
          flesh@transfem.socialF This user is from outside of this forum
          flesh@transfem.socialF This user is from outside of this forum
          flesh@transfem.social
          wrote last edited by
          #39

          @EeveeEuphoria@social.translunar.academy @k3ym0@infosec.exchange Screams and fades into dust.

          1 Reply Last reply
          0
          • eeveeeuphoria@social.translunar.academyE eeveeeuphoria@social.translunar.academy
            @k3ym0 in today's episode of "this is lazy ai vibe-coded slop":
            Link Preview ImageLink Preview Image
            colinstu@birdbutt.comC This user is from outside of this forum
            colinstu@birdbutt.comC This user is from outside of this forum
            colinstu@birdbutt.com
            wrote last edited by
            #40

            @EeveeEuphoria oh noooo 😭

            1 Reply Last reply
            0
            • tarix29@tech.lgbtT tarix29@tech.lgbt

              @k3ym0 you may already know this, but on a related note you can tunnel basically any IPv4 traffic over DNS: https://code.kryo.se/iodine/

              jbaert@mastodon.socialJ This user is from outside of this forum
              jbaert@mastodon.socialJ This user is from outside of this forum
              jbaert@mastodon.social
              wrote last edited by
              #41

              @tarix29 @k3ym0 we used this in uni when data caps were reached... but dns resolves were still allowed 🙂

              1 Reply Last reply
              0
              • ck0@tech.lgbtC ck0@tech.lgbt

                @k3ym0 "Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well."

                Doesn't work anymore for a decade. Most serious companies don't allow DNS queries to servers outside of their network. The only endpoints allowed to do that are the corporate internal DNS.
                With DoH I'm also not sure that will work because of the corporate web proxy.

                To make data exfiltrations there are so many easy ways to do so ... Why spending time to make something over DNS when you can simply upload the files or exploit USB keys, it's not hard to bypass FW and EDR policies.

                k3ym0@infosec.exchangeK This user is from outside of this forum
                k3ym0@infosec.exchangeK This user is from outside of this forum
                k3ym0@infosec.exchange
                wrote last edited by
                #42

                @ck0

                Most serious companies don't allow DNS queries to servers outside of their network.

                Oh my sweet, sweet, child. If only this were true. I could name-drop several multi-billion $ enterprise orgs that still don’t do this.

                johntimaeus@infosec.exchangeJ 1 Reply Last reply
                0
                • kajer@infosec.exchangeK kajer@infosec.exchange

                  @k3ym0 big DNSFS energy

                  Link Preview Image
                  DNSFS. Store your files in others DNS resolver caches

                  favicon

                  (blog.benjojo.co.uk)

                  yuvalne@433.worldY This user is from outside of this forum
                  yuvalne@433.worldY This user is from outside of this forum
                  yuvalne@433.world
                  wrote last edited by
                  #43

                  @kajer @k3ym0 i was thinking of BookmarkFS
                  https://github.com/velzie/bookmarkfs

                  1 Reply Last reply
                  0
                  • benaveling@infosec.exchangeB This user is from outside of this forum
                    benaveling@infosec.exchangeB This user is from outside of this forum
                    benaveling@infosec.exchange
                    wrote last edited by
                    #44

                    DNS outbound tends to be allowed even when other protocols are not. If you run your own DNS server you can use DNS to tunnel any traffic you want. @sabik @arichtman @k3ym0

                    1 Reply Last reply
                    0
                    • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                      In today's episode of "Can It Run Doom": DNS fucking TXT records.

                      Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

                      RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

                      Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

                      blog: https://blog.rice.is/post/doom-over-dns/

                      repo: https://github.com/resumex/doom-over-dns

                      Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

                      It was always DNS.

                      #infosec #dns #doom #itisalwaysdns

                      feld@friedcheese.usF This user is from outside of this forum
                      feld@friedcheese.usF This user is from outside of this forum
                      feld@friedcheese.us
                      wrote last edited by
                      #45
                      @k3ym0 I'd be shocked if most blue teams are competent enough to figure out how to prevent the internal network from using DNS over HTTPS so they can inspect most DNS traffic now anyway
                      1 Reply Last reply
                      0
                      • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                        In today's episode of "Can It Run Doom": DNS fucking TXT records.

                        Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

                        RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

                        Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

                        blog: https://blog.rice.is/post/doom-over-dns/

                        repo: https://github.com/resumex/doom-over-dns

                        Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

                        It was always DNS.

                        #infosec #dns #doom #itisalwaysdns

                        itgrrl@infosec.exchangeI This user is from outside of this forum
                        itgrrl@infosec.exchangeI This user is from outside of this forum
                        itgrrl@infosec.exchange
                        wrote last edited by
                        #46

                        @k3ym0 paging @vampiress, @voltagex, etc. 👀

                        1 Reply Last reply
                        0
                        • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                          In today's episode of "Can It Run Doom": DNS fucking TXT records.

                          Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

                          RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

                          Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

                          blog: https://blog.rice.is/post/doom-over-dns/

                          repo: https://github.com/resumex/doom-over-dns

                          Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

                          It was always DNS.

                          #infosec #dns #doom #itisalwaysdns

                          flo_rian@norden.socialF This user is from outside of this forum
                          flo_rian@norden.socialF This user is from outside of this forum
                          flo_rian@norden.social
                          wrote last edited by
                          #47

                          @k3ym0
                          “Those engineers are spinning in their graves”
                          1987 was less than 40 years ago and as far I can tell the author is still alive and active.

                          mal3aby@mastodon.smears.orgM 1 Reply Last reply
                          0
                          • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                            In today's episode of "Can It Run Doom": DNS fucking TXT records.

                            Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

                            RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

                            Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

                            blog: https://blog.rice.is/post/doom-over-dns/

                            repo: https://github.com/resumex/doom-over-dns

                            Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

                            It was always DNS.

                            #infosec #dns #doom #itisalwaysdns

                            firehawke_r@mastodon.socialF This user is from outside of this forum
                            firehawke_r@mastodon.socialF This user is from outside of this forum
                            firehawke_r@mastodon.social
                            wrote last edited by
                            #48

                            @k3ym0 While DOOM is a pretty effective demo, I can't help but feel NES ROMs, which run anywhere from 24KB to 512KB would have been even more effective (and would seriously piss Nintendo off in the process, for a double win)

                            1 Reply Last reply
                            0
                            • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                              In today's episode of "Can It Run Doom": DNS fucking TXT records.

                              Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

                              RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

                              Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

                              blog: https://blog.rice.is/post/doom-over-dns/

                              repo: https://github.com/resumex/doom-over-dns

                              Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

                              It was always DNS.

                              #infosec #dns #doom #itisalwaysdns

                              E This user is from outside of this forum
                              E This user is from outside of this forum
                              esoteric_programmer@social.stealthy.club
                              wrote last edited by
                              #49

                              @k3ym0 holy shit, awesome! this sounds like a passage from @pluralistic little brother, I can't spoil it any further, but it involves dns

                              1 Reply Last reply
                              0
                              • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                                In today's episode of "Can It Run Doom": DNS fucking TXT records.

                                Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

                                RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

                                Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

                                blog: https://blog.rice.is/post/doom-over-dns/

                                repo: https://github.com/resumex/doom-over-dns

                                Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

                                It was always DNS.

                                #infosec #dns #doom #itisalwaysdns

                                zymurgic@mastodon.onlineZ This user is from outside of this forum
                                zymurgic@mastodon.onlineZ This user is from outside of this forum
                                zymurgic@mastodon.online
                                wrote last edited by
                                #50

                                @k3ym0 I did long ago work out that DNS is jolly good at distributing fairly static hierarchical datasets, because it inherently caches. For instance, they were once used to route faxes to appropriate gateways on the old tpc.int email to fax service. I also worked out a postcode to address and postcode geocoding schema.

                                1 Reply Last reply
                                0
                                • flo_rian@norden.socialF flo_rian@norden.social

                                  @k3ym0
                                  “Those engineers are spinning in their graves”
                                  1987 was less than 40 years ago and as far I can tell the author is still alive and active.

                                  mal3aby@mastodon.smears.orgM This user is from outside of this forum
                                  mal3aby@mastodon.smears.orgM This user is from outside of this forum
                                  mal3aby@mastodon.smears.org
                                  wrote last edited by
                                  #51

                                  @Flo_Rian @k3ym0 Yep - first reaction: "Wait, who buried Paul Mockapetris alive?!"

                                  1 Reply Last reply
                                  0
                                  • zaphodb@twitter.resolvt.netZ This user is from outside of this forum
                                    zaphodb@twitter.resolvt.netZ This user is from outside of this forum
                                    zaphodb@twitter.resolvt.net
                                    wrote last edited by
                                    #52

                                    @da_667 @DaveMWilburn @k3ym0 .oO( ip6.arpa PTR )

                                    1 Reply Last reply
                                    0
                                    • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                                      In today's episode of "Can It Run Doom": DNS fucking TXT records.

                                      Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

                                      RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

                                      Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

                                      blog: https://blog.rice.is/post/doom-over-dns/

                                      repo: https://github.com/resumex/doom-over-dns

                                      Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

                                      It was always DNS.

                                      #infosec #dns #doom #itisalwaysdns

                                      artemis@climatejustice.socialA This user is from outside of this forum
                                      artemis@climatejustice.socialA This user is from outside of this forum
                                      artemis@climatejustice.social
                                      wrote last edited by
                                      #53

                                      @k3ym0 holy shit that is next level 'because I could'. Mad props.

                                      1 Reply Last reply
                                      0
                                      • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                                        In today's episode of "Can It Run Doom": DNS fucking TXT records.

                                        Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

                                        RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

                                        Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

                                        blog: https://blog.rice.is/post/doom-over-dns/

                                        repo: https://github.com/resumex/doom-over-dns

                                        Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

                                        It was always DNS.

                                        #infosec #dns #doom #itisalwaysdns

                                        messieass@procial.tchncs.deM This user is from outside of this forum
                                        messieass@procial.tchncs.deM This user is from outside of this forum
                                        messieass@procial.tchncs.de
                                        wrote last edited by
                                        #54

                                        @k3ym0@infosec.exchange
                                        Ho. Lee. Shit
                                        Was it already encoded in morse code?
                                        This clearly HAD to be done, but not by anyone i know.

                                        1 Reply Last reply
                                        0
                                        • k3ym0@infosec.exchangeK k3ym0@infosec.exchange

                                          @ck0

                                          Most serious companies don't allow DNS queries to servers outside of their network.

                                          Oh my sweet, sweet, child. If only this were true. I could name-drop several multi-billion $ enterprise orgs that still don’t do this.

                                          johntimaeus@infosec.exchangeJ This user is from outside of this forum
                                          johntimaeus@infosec.exchangeJ This user is from outside of this forum
                                          johntimaeus@infosec.exchange
                                          wrote last edited by
                                          #55

                                          @k3ym0 @ck0

                                          Even if they don't allow queries beyond the internal servers. Guess what the internal servers are doing?
                                          They are relaying the queries and answers.

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups