A technique that encodes data within DNS queries and responses to create a covert communication channel. Attackers use DNS tunneling for data exfiltration and command-and-control traffic because DNS is rarely blocked by firewalls.
Related Terms
Data Breach
data-protectionAn incident where sensitive, protected, or confidential data is accessed, disclosed, or stolen by unauthorized individua...
Domain Name System (DNS)
network-securityThe internet's system for translating human-readable domain names into IP addresses. DNS is a critical infrastructure co...
Firewall
network-securityA network security system that monitors and controls incoming and outgoing network traffic based on predetermined securi...