exam questions

Exam 350-701 All Questions

View all questions & answers for the 350-701 exam

Exam 350-701 topic 1 question 291 discussion

Actual exam question from Cisco's 350-701
Question #: 291
Topic #: 1
[All 350-701 Questions]

How is data sent out to the attacker during a DNS tunneling attack?

  • A. as part of the domain name
  • B. as part of the UDP/53 packet payload
  • C. as part of the TCP/53 packet header
  • D. as part of the DNS response packet
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
NikoNiko
Highly Voted 2 years, 4 months ago
This is a tricky question. Communication on port 53 (both TCP and UDP) is used by DNS but usage of port 53 itself does NOT mean that we are using DNS encapsulation. For DNS tunneling to be successful, we need to use real DNS protocol (i. e. DNS headers) and payload, where exfiltrated data are placed as part of domain in question. With no DNS encapsulation, traffic would NOT reach attackers destination server (resolution of queries by DNS server is needed here and forwarding them to the attacker's domain's authoritative DNS server). So correct answer is "part of the domain name", which means we are talking about real DNS communication where domain name is used to exfiltrate data (not just any L4 protocol with port 53).
upvoted 11 times
NikoNiko
2 years, 4 months ago
DNS Tunneling: 1. The attacker acquires a domain, for example, evilsite.com. 2. The attacker configures the domain’s name servers to his own DNS server. 3. The attacker delegates a subdomain, such as “tun.evilsite.com” and configures his machine as the subdomain’s authoritative DNS server. 4. Any DNS request made by the victim to “{data}.tun.evilsite.com” will end up reaching the attacker’s machine. 5. The attacker’s machine encodes a response that will get routed back to the victim’s machine. 6. A bidirectional data transfer channel is achieved using a DNS tunneling tool. See diagram here: https://www.cynet.com/attack-techniques-hands-on/how-hackers-use-dns-tunneling-to-own-your-network/
upvoted 7 times
...
...
leowulf
Highly Voted 2 years, 2 months ago
A is the answer. Please check below: https://www.infoblox.com/dns-security-resource-center/dns-security-issues-threats/dns-security-threats-data-exfiltration/
upvoted 7 times
...
MPoels
Most Recent 9 months ago
Selected Answer: A
While DNS tunneling attacks typically use UDP due to its lightweight and connectionless nature, there are indeed methods and tools that leverage TCP for DNS tunneling.
upvoted 1 times
...
ums008
1 year, 4 months ago
Selected Answer: A
Should be A: During a DNS tunnelling attack, data is sent out to the attacker as part of the domain name. DNS tunnelling involves using DNS protocols to bypass traditional network security measures and establish a covert communication channel between an attacker-controlled server and a compromised device. In a DNS tunnelling attack, the attacker embeds the data they want to exfiltrate or send out within the subdomains or labels of the domain name. By encoding the data in the domain name, the attacker can hide the information in DNS queries or responses. The compromised device or malware on the device generates DNS queries or requests with the embedded data in the domain name. These queries are sent to the attacker-controlled DNS server. The attacker's DNS server interprets the embedded data in the domain name and extracts it from the DNS queries.
upvoted 1 times
...
DWizard
1 year, 4 months ago
Selected Answer: B
Already explained
upvoted 1 times
...
DWizard
1 year, 4 months ago
I'd go for B here, the exfiltrated information (data sent TO the attacker) cannot go as part of the domain name, it must be part of the payload. Check this questions, which can provide a little more enlightenment: https://www.examtopics.com/discussions/cisco/view/64962-exam-350-701-topic-1-question-16-discussion/
upvoted 1 times
...
GCalvo
1 year, 6 months ago
Selected Answer: A
The correct answer is A. as part of the domain name. During a DNS tunneling attack, data is sent out to the attacker as part of the domain name. DNS (Domain Name System) is primarily designed to resolve domain names to IP addresses and vice versa. However, in a DNS tunneling attack, attackers exploit the DNS protocol to bypass traditional network security measures and exfiltrate data.
upvoted 3 times
...
unclemonkeyboy
1 year, 7 months ago
Selected Answer: A
The data that is captured, is sent as the sub-domain dns query. As Jessie45785 pointed out https://blogs.blackberry.com/en/2023/03/dns-tunneling-guide-to-detection-and-prevention
upvoted 2 times
...
Jessie45785
1 year, 7 months ago
Selected Answer: A
The true is both A and B are correct but knowing how Cisco builds its questions I would go for A - there is also article which support my statement: https://blogs.blackberry.com/en/2023/03/dns-tunneling-guide-to-detection-and-prevention
upvoted 3 times
...
achille5
1 year, 9 months ago
Selected Answer: A
During a DNS tunneling attack, data is sent out to the attacker as part of the domain name. DNS (Domain Name System) is a protocol used to convert domain names into IP addresses that computers can use to communicate with each other over the internet. In a DNS tunneling attack, an attacker takes advantage of the fact that DNS requests and responses can contain more than just domain name information. The attacker can use the additional space in the DNS message to encode data, effectively tunneling it out through the DNS system.
upvoted 1 times
...
sull3y
1 year, 9 months ago
B. Data can be sent out to the attacker during a DNS tunneling attack as part of the UDP/53 packet payload. In this type of attack, the attacker creates a covert communication channel over the DNS protocol by encoding data into the payload of DNS requests and responses. The encoded data is sent as part of the UDP/53 packet payload, which is normally used to carry DNS query and response messages. The data is then decoded by the attacker, who can use this information to gain unauthorized access to the target network or steal sensitive information.
upvoted 2 times
...
ddev3737
1 year, 10 months ago
Selected Answer: B
DNS queries and responses, so the data is sent as part of the payload of a UDP packet on port 53.
upvoted 3 times
...
Emlia1
2 years ago
I prefer B, I am not sure.
upvoted 3 times
...
Fugashi
2 years, 6 months ago
Selected Answer: B
DNS Tunneling is a method of cyber attack that encodes the data of other programs or protocols in DNS queries and responses. DNS tunneling often includes data payloads that can be added to an attacked DNS server and used to control a remote server and applications.
upvoted 3 times
...
Pwned
2 years, 6 months ago
Selected Answer: B
y vote for B
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...