DNS is an infrastructure protocol that is ubiquitous and enabled in even the most restrictive networks. This makes DNS tunneling a highly effective two-way attack vector that is relatively simple to implement and performs well in terms of latency and bandwidth.
Download your copy of this white paper to learn:
- How a typical DNS tunneling is mounted
- Why it has become a popular technique for hackers
- How to detect DNS tunneling in your cloud deployments using Alcide Microservices Firewall