[[{“value”:”A new keylogging server and client tool have been released on GitHub for pentesters. The tool utilizes DNS tunneling to transmit keystrokes through firewalls, potentially evading detection covertly. The tool, DNS-Tunnel-Keylogger, was designed for post-exploitation activities for pentesters and emphasizes lightweight exfiltration and persistence to minimize the chances of being discovered by security systems. The
The post DNS Tunnel Keylogger – An Offensive Post-Exploitation Tool For Pentesters appeared first on Cyber Security News.”}]] Read More
Posted inNews