After a hacker obtained a shell on a Linux box, the hacker then sends the exfiltrated data via Domain Name System (DNS). This is an example of which type of data exfiltration?
After a hacker obtained a shell on a Linux box, the hacker then sends the exfiltrated data via Domain Name System (DNS). This is an example of which type of data exfiltration?
A. Covert channels Explanation: Covert channels are methods used to secretly transfer data in a way that is not intended or expected. In this case, the hacker is using the DNS protocol, which is typically used for domain name resolution, to secretly exfiltrate data. This is a classic example of using a covert channel to bypass traditional security monitoring, as DNS traffic is often not closely inspected for data exfiltration. Why the other answers are incorrect: B. File sharing services: These involve legitimate or rogue services like Dropbox, Google Drive, etc., for data transfer, not DNS-based exfiltration. C. Steganography: Involves hiding data within other files, like images or audio, not within DNS queries or traffic. D. Rogue service: Refers to unauthorized services running on a system, but it doesn’t specifically describe using DNS as a channel for exfiltration.