Python DNS Exfiltration Tool - Domain Name Service File Transfer Protocol (DFTP) Client and Server. TODO: Integrate Lexer, Parser instead of split()
Python
Switch branches/tags
Nothing to show
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Failed to load latest commit information.
.gitignore
DNS_Exfiltration.pdf
README.md
Screen Shot 2012-12-10 at 2.14.42 PM.png
client_DFTP.py
processDNS.py
process_verbose_DNS.py
server_DFTP.py
sheep.png
simple_client.py
simple_client_MD5.py
simple_client_SHA1.py
simple_client_SHA256.py
simple_client_binary.py
simple_client_binary_pdf.py
simple_client_hex.py
simple_server.py
simple_server_binary.py
simple_server_hex.py
simple_server_twisted.py

README.md

DFTP

13 Signs that "bad guys" are using DNS Exfiltration to steal your data.

How do you test DNS Exfiltration? How do you use Machine Learning to catch the bad guys?

In this project I have built a Python DNS Exfiltration Tool.

I have also built a basic POC Machine Learning algorithm to catch "bad guys" exfiltrating with my DNS tool.

Domain Name Service File Transfer Protocol (DFTP) Client and Server

Based on http://energy.gov/sites/prod/files/oeprod/DocumentsandMedia/DNS_Exfiltration_2011-01-01_v1.1.pdf

More Reading

![alt text][logo] [logo]: https://github.com/bigsnarfdude/DFTP/raw/master/Screen%20Shot%202012-12-10%20at%202.14.42%20PM.png "SHA1 DNS Exfil Screenshot"