Skip to content

HTTPS clone URL

Subversion checkout URL

You can clone with
or
.
Download ZIP
Python DNS Exfiltration Tool - Domain Name Service File Transfer Protocol (DFTP) Client and Server. TODO: Integrate Lexer, Parser instead of split()
Python
Branch: master

Fetching latest commit…

Cannot retrieve the latest commit at this time

Failed to load latest commit information.
.gitignore
DNS_Exfiltration.pdf
README.md
Screen Shot 2012-12-10 at 2.14.42 PM.png
client_DFTP.py
processDNS.py
process_verbose_DNS.py
server_DFTP.py
sheep.png
simple_client.py
simple_client_MD5.py
simple_client_SHA1.py
simple_client_SHA256.py
simple_client_binary.py
simple_client_binary_pdf.py
simple_client_hex.py
simple_server.py
simple_server_binary.py
simple_server_hex.py
simple_server_twisted.py

README.md

DFTP

13 Signs that "bad guys" are using DNS Exfiltration to steal your data.

How do you test DNS Exfiltration? How do you use Machine Learning to catch the bad guys?

In this project I have built a Python DNS Exfiltration Tool.

I have also built a basic POC Machine Learning algorithm to catch "bad guys" exfiltrating with my DNS tool.

Domain Name Service File Transfer Protocol (DFTP) Client and Server

Based on http://energy.gov/sites/prod/files/oeprod/DocumentsandMedia/DNS_Exfiltration_2011-01-01_v1.1.pdf

More Reading

alt text

Something went wrong with that request. Please try again.