EXPLORE
← Back to Explore
T1583.002

DNS Server

Adversaries may set up their own Domain Name System (DNS) servers that can be used during targeting. During post-compromise activity, adversaries may utilize DNS traffic for various tasks, including for Command and Control (ex: [Application Layer Protocol](https://attack.mitre.org/techniques/T1071)). Instead of hijacking existing DNS servers, adversaries may opt to configure and run their own DNS servers in support of operations. By running their own DNS servers, adversaries can have more contr...

PRE
0
Detections
0
Sources
3
Threat Actors

THREAT ACTORS (3)

DETECTIONS (0)