DNS Shell – Tool to Compromise and Maintain Control Over Victim Machine

CERT-LatestNews ThreatsCybercrime
DNS protocol runs on the application layer of TCP/IP Model . When an attacker or pentester tries to exploit DNS with RCE vulnerability (Remote Command Execution) destination server acts as the backdoor. DNS Shell Tool is python based Exploitation tool to compromise and also maintaining the access via command and control to the server.