John, a professional hacker, decided to use DNS to perform data exfiltration on a target network. In this process, he embedded malicious data into the DNS protocol packets that even DNSSEC cannot detect. Using this technique, John successfully injected malware to bypass a firewall and maintained communication with the victim machine and C&C server.
What is the technique employed by John to bypass the firewall?
armangua
Highly Voted 1 year, 8 months agodinonino
9 months agoDaniel8660
Most Recent 8 months agoKhedya007
10 months, 3 weeks agoANDRESCB1988
1 year, 11 months agoamericaman80
2 years, 2 months ago