It's DNS again π’ Did you know this Malware Hack?
TShark and CyberChef
In this section, the speaker introduces TShark and CyberChef as tools to read PCAP files and decode strings respectively.
Introduction to TShark
- TShark is a tool used to read PCAP files.
- It can be used to filter data and extract specific fields from the file.
- The extracted data can then be used for further analysis.
Introduction to CyberChef
- CyberChef is a tool that can be used to decode strings.
- It allows users to input encoded strings and tinker around with them.
- Users can use different decoding methods such as Base64.
Understanding Malware Scripts
In this section, the speaker discusses how malware scripts work and how they are encoded using different numbering systems.
Reassembling Malware Scripts
- Malware scripts are sent in pieces to avoid detection by IDS or IPS systems.
- Once all the pieces of the script have been received, it is reassembled on the victim machine.
Numbering Systems Used in Malware Scripts
- Different numbering systems such as hexadecimal and binary are used in malware scripts.
- Understanding these numbering systems is important when analyzing malware scripts.
Conclusion
In this section, the speaker concludes by emphasizing the importance of understanding malware scripts and different numbering systems.
Importance of Understanding Malware Scripts
- Understanding malware scripts is important for threat hunting and troubleshooting.
- DNS TXT fields are commonly used to send instructions in malware scripts.
- Once a script has been executed on a victim machine, it can start sending instructions back to the attacker.
Importance of Understanding Numbering Systems
- Different numbering systems such as hexadecimal and binary are used in malware scripts.
- Understanding these numbering systems is important when analyzing malware scripts.
so I did not have to translate anything into English
Introduction to DNSMessenger
In this section, Chris and David discuss how DNSMessenger works and how it can be used to deliver C2 traffic in DNS calls.
How DNSMessenger Works
- DNSMessenger is a malware that was designed to illustrate how C2 traffic could be buried in DNS calls.
- The client initially talks to the 8.8.8.8 server, allegedly.
- The malware is called DNSMessenger, and we're going to call that our client.
- The malware sends requests for reverse records for IP addresses associated with the C2 server.
Understanding DNS Queries
- Packets don't lie; they are essential for troubleshooting and understanding cybersecurity issues.
- Studying packets will make you better at threat hunting or when you have been compromised.
- A TXT record is a type of request that allows human-readable notes to be in records.
- DNS has the ability to do different types of requests.
What is a DNS TXT Record?
- A TXT record was originally intended as a place for human-readable notes to be in records but now can include machine-readable data.
Conclusion
In this section, David thanks Chris for sharing his knowledge about cybersecurity and packet analysis.
Final Thoughts
- There are many ways that packets can help us understand cybersecurity issues better.
- Studying packets will make you better at threat hunting or when you have been compromised.
DNS TXT Record in a DNS Reply
In this section, David Bombal and Chris Greer discuss the concept of putting TXT in a DNS reply.
Putting TXT in a DNS Reply
- It is a way of putting TXT in a DNS reply.
- More details are provided on the topic.
- Chris Greer offers to demo it for viewers.
- Viewers are asked to comment on what they want Chris to talk about in future videos.
- Viewers are also asked to provide feedback on an interesting-looking site.
- Chris teaches viewers how to use VirusTotal when unsure about a site.