▲ | mycall 3 days ago | ||||||||||||||||||||||
The wild part of DNS is that port 53 is typically open on firewalls and is excellent for data exfiltration/infiltration. | |||||||||||||||||||||||
▲ | lormayna 3 days ago | parent | next [-] | ||||||||||||||||||||||
In a corporate environment you must use only the company DNS internal resolver and they are the only one that should go outside on port 53. This is a basic security measure to detect and block every attempt of DNS tunnelling or exfiltration | |||||||||||||||||||||||
| |||||||||||||||||||||||
▲ | Sophira 3 days ago | parent | prev | next [-] | ||||||||||||||||||||||
AFWall+ on Android is an example of this - even if an app is blocked, as long as it has Internet permission it can still make DNS requests, allowing for two-way communication despite the firewall. | |||||||||||||||||||||||
▲ | nenenejej 3 days ago | parent | prev | next [-] | ||||||||||||||||||||||
Is it? Most firewalls I see allow no inbound by default (although all outbound) | |||||||||||||||||||||||
| |||||||||||||||||||||||
▲ | notepad0x90 3 days ago | parent | prev | next [-] | ||||||||||||||||||||||
highly detectable though. modern ngfw's are all over this. | |||||||||||||||||||||||
▲ | deoxykev 3 days ago | parent | prev [-] | ||||||||||||||||||||||
And it typically works on captive portals too before payment. |