DNS Tunnel Keylogger – An Offesnsive Post-Exploitation Tool For Pentesters

DNS Tunnel Keylogger – An Offensive Post-Exploitation Tool For Pentesters

A new keylogging server and client tool have been released on GitHub for pentesters. The tool utilizes DNS tunneling to transmit keystrokes through firewalls, potentially evading detection covertly. The tool, DNS-Tunnel-Keylogger, was designed for...
BIND DNS Server Vulnerability

BIND DNS Vulnerability Lets Attackers Flood Server With DNS Messages

The Internet Systems Consortium (ISC) has released critical security advisories addressing multiple vulnerabilities in the Berkeley Internet Name Domain (BIND) 9 software, a cornerstone of the Domain Name System (DNS) infrastructure. These vulnerabilities, identified as...
BIND DNS Software

BIND DNS Software High-Severity Flaws Let Hackers Remotely Trigger DoS Attack

The Internet Systems Consortium (ISC) released security advisories on January 25, 2023, to address flaws in the DNS software suite BIND.  A denial of service could occur if these vulnerabilities are exploited. The flaws that...
TsuNAME Vulnerability

New TsuNAME DNS Let Attackers DNS Servers with Malicious Queries

Researchers identified a DNS vulnerability called “TsuNAME”. This vulnerability affects  DNS resolvers and can be exploited to attack authoritative servers. The authoritative DNS servers translate web domains to IP addresses and pass this information to...
New DoS Attack ‘DNSBomb’ Exploiting DNS Queries & Responses

New DoS Attack ‘DNSBomb’ Exploiting DNS Queries & Responses

Cybersecurity researchers have unveiled a new and potent Denial of Service (DoS) attack, dubbed "DNSBomb." This attack leverages the inherent mechanisms of the Domain Name System (DNS) to create a powerful pulsing DoS attack...
DNS Analyzer Burp Suite

DNS Analyzer: A New Burp Suite Extension to Find DNS Flaws in Web Apps

DNS flaws are very common on web applications where the DNS resolvers are vulnerable to Kaminsky attacks. If threat actors are able to predict portions of a DNS query and the source ports, they...
Alert!! CISA, DHS Urges Government Agencies to Patch Critical DNS Flaw Within 24 Hours

Alert!! CISA, DHS Urges Government Agencies to Patch Critical DNS Flaw Within 24 Hours

The U.S Department of Homeland Security's Cybersecurity and Infrastructure Security Agency has recently issued an order to the civil federal government agencies that are using Windows Server. They have been asked to patch a...
DNSpooq Vulnerability  In DNS software Let Attackers hijack Millions of Network Devices

DNSpooq Vulnerability In DNS software Let Attackers hijack Millions of Network Devices

Recently, cybersecurity experts have detected nearly 7 vulnerabilities in a very popular DNS software set that has been executed in routers and access points in every kind of business.  We all know that Dnsmasq is...
Muddling Meerkat Using DNS As A Powerful Weapon For Sophistication

Muddling Meerkat Using DNS As A Powerful Weapon For Sophistication

Hackers exploit DNS vulnerabilities to redirect users to malicious websites, launch distributed denial-of-service (DDoS) attacks by overwhelming DNS servers, and manipulate domain resolutions to intercept traffic for surveillance or data theft purposes. Infoblox researchers recently...
Roaming Mantis Uses Android Malware that Hijacks DNS by Exploiting Wi-Fi Routers

Roaming Mantis Uses Android Malware To Hijacks DNS by Exploiting Wi-Fi Routers

Roaming Mantis is a cyberattack campaign that has been active for an extended period of time. The attackers behind this campaign use malicious APK files, which are the files used to install apps on...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...