Completed
DNS Tunneling Example: Infiltration
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Turning DNS from Security Target into Security Tool
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Most Malware Uses DNS in Attacks
- 3 How DNS Is (Ab) Used: Finding a C&C Server
- 4 How DNS IS (Ab)Used: Tunneling
- 5 DNS Tunneling Example: Infiltration
- 6 Actual Photograph of Paul Publishing His Blog
- 7 Enter Response Policy Zones
- 8 How Response Policy Zones Work
- 9 Enter Passive DNS
- 10 Passive DNS Databases
- 11 Closing the Loop
- 12 Case Study: Farsight's NOD Feed
- 13 How to Apply What You've Learned Today