John, a professional hacker, decided to use DNS to perform data exfiltration on a target network. In this process, he embedded malicious data into the DNS protocol packets that even DNSSEC cannot detect. Using this technique, John successfully injected malware to bypass a firewall and maintained communication with the victim machine and C&C server.
What is the technique employed by John to bypass the firewall?
eli117
Highly Voted 1 year, 7 months agoinsaniunt
Most Recent 11 months agoIPconfig
1 year agoVincent_Lu
1 year, 4 months agovictorfs
1 year, 6 months agojeremy13
1 year, 6 months ago