TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

DNS Over HTTPS for Cobalt Strike

BHIS · 2021-11-17 · Read original ↗

ATT&CK techniques detected

8 predictions
T1572Protocol Tunneling
96%
"of any current tools or products that do this. my understanding is that the primary defense against this attack is blocking outbound 443 / tcp to known doh servers that an organization is not using. most networks i encounter still use traditional dns, often with a local dns serve…"
T1572Protocol Tunneling
88%
"dns over https for cobalt strike dns over https for cobalt strike kyle avery / / introduction setting up the c2 infrastructure for red team engagements has become more and more of a hassle in recent years. this is a win for the security community because it means that vendors and…"
T1572Protocol Tunneling
87%
"over https for beacon provides us reputable domains and valid ssl certificates without needing an account or any configuration of the redirector. this reduces an operator ’ s setup time even further and eliminates the risk of account shutdown. today ’ s topic : dns over https for…"
T1572Protocol Tunneling
76%
"we can only send a small amount of data in each packet. second, we have no control over the path or domain names of available servers. it seems easier for an environment or appliance to deny outbound 443 / tcp to the list of popular or known doh servers than block microsoft ’ s *…"
T1090.004Domain Fronting
67%
"cdn ) became more accessible to developers, attackers moved from traditional redirectors to these platforms because they often provide a valid domain name and even ssl certificate to the user, reducing the work of an attacker. a technique known as “ domain fronting ” was later di…"
T1572Protocol Tunneling
64%
"servers at line 116 of the dnsquery _ a. c file in the hooks directory. once downloaded, you will have to build the program. this will require a linux host with nasm and mingw installed. once you have these programs, run the make command to create the necessary files. import the …"
T1665Hide Infrastructure
45%
"cdn ) became more accessible to developers, attackers moved from traditional redirectors to these platforms because they often provide a valid domain name and even ssl certificate to the user, reducing the work of an attacker. a technique known as “ domain fronting ” was later di…"
T1572Protocol Tunneling
42%
"_. credits - the idea to use dns over https for c2 comes from the work of austin hudson. this technique and blog would not have happened without his titanldr project. austin ’ s code and tweets have inspired many of my personal projects ; i highly recommend following him. - i men…"

Summary

Kyle Avery // Introduction Setting up the C2 infrastructure for red team engagements has become more and more of a hassle in recent years. This is a win for the […]

The post DNS Over HTTPS for Cobalt Strike appeared first on Black Hills Information Security, Inc..