John, a professional hacker, decided to use DNS to perform data exfiltration on a target network. In this process, he embedded malicious data into the DNS protocol packets that even DNSSEC cannot detect. Using this technique, John successfully injected malware to bypass a firewall and maintained communication with the victim machine and C&C server.
What is the technique employed by John to bypass the firewall?
armangua
Highly Voted 1 year, 6 months agodinonino
7 months, 1 week agoDaniel8660
Most Recent 6 months, 2 weeks agoKhedya007
9 months agoANDRESCB1988
1 year, 9 months agoamericaman80
2 years ago