Skip to content

Simple Data-Exfiltration approach implemented in Python 3 using the Domain Name Service (DNS) Protocol

License

Notifications You must be signed in to change notification settings

cr4kn4x/DNS-DataExfiltration

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

DNS-DataExfiltration

Description

This implementation is inspired by the PyExfil Project (Copyright (c) 2014 Yuval tisf Nativ, Link: https://github.com/ytisf/PyExfil)

In this repository, you will find a Python3 implementation of my Data-Exfiltration approach to bypass Firewalls for e.g. File-Transfers. This piece of code can be used for penetration testing !only! on your own devices!

Just study the code and you will understand the features this implementation provides for you. Most imporant features are:

  • Fast & reliable encryption using SALSA20
  • Integrity Protection / Fail safe transfer by using CRC32
  • Adjustable Packet Size & Sending Interval
  • No malformed DNS requests

Prerequisites

Make sure Python3 is installed on your System.

  1. Clone this repository
git clone https://github.com/cr4kn4x/DNS-DataExfiltration.git
  1. Open the folder of the cloned repository in your shell
cd DNS-DataExfiltration
  1. Initialize Python virtual environment
python python -m venv ./
  1. Activate virtual environment
.\Scripts\Activate.ps1
  1. Install requirements
pip install -r requirements.txt
  1. Run DNS-Exfiltration Server
python Server/main.py
  1. Run DNS-Exfiltration Client
python Client/main.py

About

Simple Data-Exfiltration approach implemented in Python 3 using the Domain Name Service (DNS) Protocol

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Languages