In today's episode of "Can It Run Doom": DNS fucking TXT records.

Some absolute madlad (cough Adam Rice cough) compressed the entire shareware DOOM WAD, split it into around 1,964 chunks, shoved them into Cloudflare TXT records, and wrote a PowerShell script that reassembles and runs the whole goddamn game from DNS queries alone. Nothing touches disk. The DLLs are in DNS. THE FUCKING DLLS ARE IN DNS.

RFC 1035 was written in 1987. Those engineers are spinning in their graves fast enough to generate municipal power.

Bonus: this is a fully functional globally-distributed covert data exfil channel that your NGFW will never fucking see if you're not doing deep DNS inspection. Sleep well.

blog: https://blog.rice.is/post/doom-over-dns/

repo: https://github.com/resumex/doom-over-dns

Also lmao @ every blue team that has never once looked at their DNS query volume. How's that DLP policy working out for you.

It was always DNS.

#infosec #dns #doom #itisalwaysdns

@k3ym0 new cloud storage just dropped
@k3ym0 you may already know this, but on a related note you can tunnel basically any IPv4 traffic over DNS: https://code.kryo.se/iodine/
kryo.se: iodine (IP-over-DNS, IPv4 over DNS tunnel)

iodine is a free (ISC licensed) tunnel application to forward IPv4 traffic through DNS servers (IP over DNS). Works on Linux, FreeBSD, NetBSD, OpenBSD and Mac OS X.

@k3ym0 shit like this makes me glad I no longer work in #cybersec

@k3ym0
IP over DNS has been a thing for a while now, sometimes used to bypass captive portals for paid internet access

#infosec #dns #doom #itisalwaysdns

@k3ym0 Doom Network Service 🎉
@k3ym0 shit. Time to do Bad Apple on DNS.
@k3ym0 The concept is very old, I was using dns2tcp to have free wifi on plane trips in 2010 and even before during pentests. Long TXT replies trigger red alerts on most intrusion detection systems nowadays.
@k3ym0 now... can it do deathmatch over doom over dns? :3
@k3ym0 For quite a loose definition of "run".

@k3ym0
> covert data exfil channel

as if iodine wasn't already a thing