Into the Rabbit Hole – Offensive DNS Tunneling Rootkits

Learn how DNS tunneling works, how to configure well-known DNS tunneling attack rootkits to test the security and detection capabilities in your environment, and get industry best practices for mitigating this attack.

*** This is a Security Bloggers Network syndicated blog from Fortinet All Blogs authored by Fortinet All Blogs. Read the original post at: http://feedproxy.google.com/~r/fortinet/blogs/~3/NheApy1eujs/into-the-rabbit-hole-offensive-dns-tunneling-rootkits