https://github.com/JoelGMSec/Invoke-DNSteal
Simple & Customizable DNS Data Exfiltrator
https://github.com/JoelGMSec/Invoke-DNSteal
data delay dns domain exfiltrator fake random tcp udp
Last synced: 3 months ago
JSON representation
Simple & Customizable DNS Data Exfiltrator
- Host: GitHub
- URL: https://github.com/JoelGMSec/Invoke-DNSteal
- Owner: JoelGMSec
- License: gpl-3.0
- Created: 2021-06-24T11:03:09.000Z (over 4 years ago)
- Default Branch: main
- Last Pushed: 2023-07-17T11:26:19.000Z (about 2 years ago)
- Last Synced: 2025-05-08T20:45:08.404Z (5 months ago)
- Topics: data, delay, dns, domain, exfiltrator, fake, random, tcp, udp
- Language: PowerShell
- Homepage: https://darkbyte.net
- Size: 427 KB
- Stars: 109
- Watchers: 6
- Forks: 23
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - JoelGMSec/Invoke-DNSteal - Simple & Customizable DNS Data Exfiltrator (PowerShell)
README
**Invoke-DNSteal** is a Simple & Customizable DNS Data Exfiltrator.
This tool helps you to exfiltrate data through DNS protocol over UDP and TCP, and lets you control the size of queries using random delay. Also, allows you to avoid detections by using random domains in each of your queries and you can use it to transfer information both locally and remotely.
# Requirements
- Powershell 4.0 or higher
- Python 2# Download
It is recommended to clone the complete repository or download the zip file.
You can do this by running the following command:
```
git clone https://github.com/JoelGMSec/Invoke-DNSteal.git
```# Usage
```
.\Invoke-DNSteal.ps1 -h___ _ ____ _ _ ____ _ _
|_ _|_ __ _ __ __ | | __ __ | _ \| \ | / ___|| |__ __ __ _| |
| || '_ \ \ / / _ \| |/ / _ \_____| | | | \| \___ \| __/ _ \/ _' | |
| || | | \ V / (_) | < __/_____| |_| | |\ |___) | || __/ (_| | |
|___|_| |_|\_/ \___/|_|\_\___| |____/|_| \_|____/ \__\___|\__,_|_|--------------------------- by @JoelGMSec --------------------------
Info: This tool helps you to exfiltrate data through DNS protocol
and lets you control the size of queries using random delayUsage: .\Invoke-DNSteal.ps1 -t target -p payload -l length
-s server -tcponly true/false -min 3000 -max 5000Parameters:
· Target: Domain target to exfiltrate data
· Payload: Payload to send over DNS chunks
· Length: Length of payload to control data size
· Server: Custom server to resolve DNS queries
· TcpOnly: Set TcpOnly to true or false
· Delay Min: Min delay time to do a query in ms
· Delay Max: Max delay time to do a query in ms
· Random: Use random domain name to avoid detectionWarning: The length (payload size) must be between 4 and 240
The process time will increase depending on data size
```### The detailed guide of use can be found at the following link:
https://darkbyte.net/exfiltrando-informacion-por-dns-con-invoke-dnsteal
# License
This project is licensed under the GNU 3.0 license - see the LICENSE file for more details.# Credits and Acknowledgments
[@3v4si0n]: https://twitter.com/3v4si0n
This script has been created and designed from scratch by Joel Gámez Molina // @JoelGMSec
Special thanks to [@3v4si0n] for DNS over TCP implementation, and some general Python code.
# Contact
This software does not offer any kind of guarantee. Its use is exclusive for educational environments and / or security audits with the corresponding consent of the client. I am not responsible for its misuse or for any possible damage caused by it.For more information, you can find me on Twitter as [@JoelGMSec](https://twitter.com/JoelGMSec) and on my blog [darkbyte.net](https://darkbyte.net).
# Support
You can support my work buying me a coffee:[
](https://www.buymeacoffee.com/joelgmsec)