https://github.com/damonmohammadbagher/redbudtree
DNS IPv6 Request Listener (UDP Port 53) for Detecting Exfiltration DATA via IPv6 DNS AAAA Record Requests
https://github.com/damonmohammadbagher/redbudtree
Last synced: 5 months ago
JSON representation
DNS IPv6 Request Listener (UDP Port 53) for Detecting Exfiltration DATA via IPv6 DNS AAAA Record Requests
- Host: GitHub
- URL: https://github.com/damonmohammadbagher/redbudtree
- Owner: DamonMohammadbagher
- Created: 2017-11-29T21:35:29.000Z (almost 8 years ago)
- Default Branch: master
- Last Pushed: 2023-06-07T03:23:20.000Z (over 2 years ago)
- Last Synced: 2025-04-19T17:16:42.032Z (6 months ago)
- Language: C#
- Homepage:
- Size: 442 KB
- Stars: 8
- Watchers: 1
- Forks: 5
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# RedbudTree

DNS IPv6 Request Listener (UDP Port 53) for Detecting Exfiltration DATA via IPv6 DNS AAAA Record Requests.Video (step by step) : https://www.youtube.com/watch?v=9jiry5b-oPo
bsdmag.org PDF Download , PDF File BSD-Magazine issue (2/2018)
For Read Full Article Please visit this link (Download - Free) : https://bsdmag.org/download/table-level-security-postgresql/
Github PDF Download , PDF File BSD-Magazine issue (2/2018)
For Read Full Article Please visit this link (Download - Free) : https://github.com/DamonMohammadbagher/Exfiltration-and-Uploading-DATA-by-DNS-Traffic-AAAA-Records-
step 1:
/// for using "Listening Mode" UDP Port 53 should be opened before using this tool.
/// windows command for opening UDP port 53 is :
/// netsh advfirewall firewall add rule name="UDP 53" dir=in action=allow protocol=UDP localport=53Note: step "1" is for attacker side
step 2:
/// Compiling C# Code.
/// windows command for this is :
/// csc.exe /out:RedbudTree.exe RedbudTree.csstep 3:
/// RedbudTree.exe Help
/// windows command for this is :/// Syntax 1: Creating Exfiltration DATA via IPv6 Address and Nslookup.
/// Syntax 1: RedbudTree.exe "AAAA" "Text"
/// Example1: RedbudTree.exe AAAA "this is my test"/// Syntax 2: Creating Exfiltration DATA via IPv6 Address and Nslookup by Text Files. (redbudtree_2.png)
/// Syntax 2: RedbudTree.exe "AAAA" "FILE" "TextFile.txt"
/// Example2: RedbudTree.exe AAAA FILE "TextFile.txt"/// Syntax 3: RedbudTree with Listening Mode
/// Syntax 3: RedbudTree.exe
Note: syntax 3 is ((Dumping DATA via IPv6 Requests , attacker side)) (redbudtree_3.png)