{"id":11915,"date":"2025-07-16T07:55:28","date_gmt":"2025-07-16T14:55:28","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=11915"},"modified":"2025-07-16T10:21:27","modified_gmt":"2025-07-16T17:21:27","slug":"dns-a-small-but-effective-c2-system","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/dns-a-small-but-effective-c2-system\/","title":{"rendered":"DNS: A Small but Effective C2 system"},"content":{"rendered":"<h3 style=\"margin-bottom:20px;\">Authors: Zafir Ansari and Darin Johnson<\/h3>\n<p>Often referred to as the \u201cphonebook of the internet,\u201d DNS translates domain names into IP addresses, allowing us to navigate the web. Its fundamental role in internet communication means DNS traffic routinely passes through corporate firewalls with minimal inspection.<\/p>\n<p>DNS tunneling involves encoding data within DNS queries and responses, creating a covert communication channel between a client and server. Cybercriminals leverage this method for purposes like command-and-control (C2) operations and data exfiltration, making it a concern for businesses and cybersecurity professionals alike. Understanding and mitigating DNS tunneling is no longer optional\u2014it is a necessity for safeguarding today\u2019s enterprises from evolving cyberthreats.<sup>1<\/sup><\/p>\n<p>In this blog, we will explore the fundamentals of DNS queries, illustrating how they typically function and how this essential process can be exploited for C2 operations and data exfiltration. We will also dive into the various families of DNS tunneling, shedding light on the techniques attackers use to bypass traditional defenses.<\/p>\n<p>To create a DNS C2 infrastructure, an actor must control a domain name\u2019s authoritative name server. Then, the malware on a victim system can perform periodic lookups of the domain, which, based on the responses, can cause the malware to perform different actions, such as perform a directory listing. The information from that directory listing can then be encoded as subdomain queries. Responses to those queries could be a simple acknowledgement of receipt or commands to perform additional actions. Because the malware uses the DNS system, there is no direct traffic between the malware client and the C2 server. Instead, the communication is sent through the victim system\u2019s recursive name server. Recursive name servers require the ability to communicate with authoritative name servers on the internet, so it will generally have permissive rules. Figure 1 shows the recursive DNS process, Figure 2 shows the packet capture of a DNS tunnel, and Table 1 shows a theoretical example of a DNS tunneling session.<\/p>\n<p>Several tools can perform DNS tunneling. Some of the most common are Cobalt Strike, DNSCat, Iodine, Pupy, and DNS Exfiltrator.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/dns-a-small-but-effective-c2-system-image-1.jpg\" alt=\"Figure 1. The typical process of how DNS operates\" \/><\/p>\n<p class=\"image-caption\">Figure 1. The typical process of how DNS operates<\/p>\n<p>As shown in Figure 1, when a client requests the IP address for a domain, the request is sent to a DNS recursive resolver. This resolver initiates a series of queries, starting with the top-level domain (TLD) server, which provides the address for the second-level domain (SLD). The process continues recursively until the resolver reaches the authoritative nameserver for the fully qualified domain name (FQDN). The authoritative resolver responds with the requested information, which could be an A record (IPv4 address), AAAA records (IPv6 address), TXT record (free form text), CNAME record (canonical domain name), or another type of record. The recursive resolver then returns this response to the client while caching both the query and the response for the specified time to live (TTL), ensuring faster responses for future requests. <\/p>\n<table >\n<thead>\n<tr>\n<th>Type<\/th>\n<th>DNS String<\/th>\n<th>Decoded Content<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Request<\/td>\n<td>\n        757365726e616d653a20616e64792<br \/>\n        c2.070617373776f72643a20313233<br \/>\n        78797a6162632e.example.com\n      <\/td>\n<td>username: andy, password: 123xyzabc.<\/td>\n<\/tr>\n<tr>\n<td>Response<\/td>\n<td>\n        ON2WI3ZAOJWSAL3FORRS643I<br \/>\n        MFSG65YK\n      <\/td>\n<td>Sudo rm \/etc\/shadow (delete password file)<\/td>\n<\/tr>\n<tr>\n<td colspan=\"3\">Table 1. An example encoded DNS tunnel query\/response using TXT records<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>A subdomain such as <span class=\"code-format\">757365726e616d653a20616e64792c2.070617373776f72643a2031323378797a6162632e.example[.]com<\/span> could be decoded to reveal sensitive information such as \u201cusername: andy, password: 123xyzabc.\u201d The server\u2019s response might include a TXT record like \u201cON2WI3ZAOJWSAL3FORRS643IMFSG65YK,\u201d which when decoded, could instruct the client to perform an action, such as sudo rm \/etc\/shadow. Similarly, attackers can encode and exfiltrate larger data, such as files, in smaller chunks using DNS, and upload malware through responses.<\/p>\n<p>It is important to note that C2 communication does not have to rely solely on TXT responses. Any DNS record type can be used as long as there is a consistent encoding. Common record types seen for DNS tunnels are A, AAAA, TXT, CNAME, and MX. See.<a href=\"https:\/\/en.wikipedia.org\/wiki\/List_of_DNS_record_types\" target=\"_blank\" rel=\"noopener\"><strong>List of DNS record types (Wikipedia)<\/strong><\/a> for a complete list of DNS record types<\/p>\n<p>Infoblox\u2019s Threat Insight machine learning algorithms<sup>2<\/sup> detect and block tunneling domains within the first few minutes of a tunnel becoming active. Generally, this happens before the handshake is completed and definitely prior to malicious C2 or exfiltration. While Threat Insight provides real-time detection on DNS tunnels in our customer networks, Infoblox Threat Intel has additional batch algorithms to detect DNS tunnels. Here we focus on our Threat Insight detector.<\/p>\n<p>Actors may choose to develop their own tunneling software or use common open-source tools. We group these open-source tools into DNS tunneling families. Over the past two years, we surveyed which families were most prevalent in our customer traffic. Table 2 provides an overview of some of these families, many of which have been leveraged in real-world attacks.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/dns-a-small-but-effective-c2-system-image-2.jpg\" alt=\"Figure 2: Packet capture displayed in Wireshark file exfiltration\" \/><\/p>\n<p class=\"image-caption\">Figure 2: Packet capture displayed in Wireshark file exfiltration<\/p>\n<table>\n<thead>\n<tr>\n<th>Family<\/th>\n<th>Example Queries<\/th>\n<th>Unique Domains (%)<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><a href=\"https:\/\/www.cobaltstrike.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Cobalt Strike<\/strong><\/a><\/td>\n<td class=\"code-format\">post.a34.cde343de.a1b2c3d4.domain[.]com<\/td>\n<td>26%<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/github.com\/iagox86\/dnscat2\" target=\"_blank\" rel=\"noopener\"><strong>DNSCat2<\/strong><\/a><\/td>\n<td class=\"code-format\">67b1017285c8d258ff8d02000cf8da0d6e.domain<br \/>\n        [.]com<\/td>\n<td>13%<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/github.com\/Arno0x\/DNSExfiltrator\" target=\"_blank\" rel=\"noopener\"><strong>DNS Exfiltrator<\/strong><\/a><\/td>\n<td class=\"code-format\">1.yqa5rey3ncqdozqvves3fvdutle7kkcnxntxzxg<br \/>\n        26s7yrfsdwncleip6irihksb.pbkyozoc5q2ne6ey<br \/>\n        5cgedjmteocypbv7hrpk2ge3mzauakbhg5kvjbsvv<br \/>\n        asov33.o25jv4gfntbulxvidykra6gua6q5kte2sf<br \/>\n        qiq7tf7jbdpexbaonxwx6lpak7eye.wmrp655fmvm<br \/>\n        onexlccsxclbd7ynu7htzqjpjf.domain[.]com<\/td>\n<td>15%<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/github.com\/BishopFox\/sliver\" target=\"_blank\" rel=\"noopener\"><strong>Sliver<\/strong><\/a><\/td>\n<td class=\"code-format\">Lpgekzzgoeqhrhaugtulrdbtbpgdzqpzmv8ieq26h<br \/>\n        b6tq8rdscexk2atbhbizpx.ngpc4isa77znjl3afc<br \/>\n        ljkswcru2tjrue8uippsywo5wciwx3iepklapemze<br \/>\n        bknv.bl37n83glutyxfgjxlvplcnyn.domain[.]c<br \/>\n        om<\/td>\n<td>12%<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/github.com\/facebookarchive\/WEASEL\" target=\"_blank\" rel=\"noopener\"><strong>Weasel<\/strong><\/a><\/td>\n<td class=\"code-format\">feiq-<br \/>\n        zb3xgodutf25v7vtcsk5dxh7awwww.9c.21f9.dom<br \/>\n        ain[.]com<\/td>\n<td>2%<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/github.com\/n1nj4sec\/pupy\" target=\"_blank\" rel=\"noopener\"><strong>Pupy<\/strong><\/a>*<\/td>\n<td class=\"code-format\">Y12rmhy9.chu5zj1hwsylrrq46fxf442yf62a9999<br \/>\n        .bla3rzp4nnwrfmnn2a3m3xa9[.]domain.com<\/td>\n<td>7% *<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/github.com\/yarrick\/iodine\" target=\"_blank\" rel=\"noopener\"><strong>Iodine<\/strong><\/a><\/td>\n<td class=\"code-format\">1i5a5xl2ojglpzzggwqlqmfea4100yk2zi3nal14s<br \/>\n        y3uvbadxu2uugmnbrmmat.gprzfx451baplinw3rx<br \/>\n        11og003leilo3pq5mz1uojs34xxc3swo2d1cwh.uj<br \/>\n        xb4cpux1w21qzbdkwmvswr5n2fxjb2kvwfqtdnfni<br \/>\n        dqnkrgjfhzcero.g45tgfvbfmzgu55cckomjgepef<br \/>\n        yqtk2acpkekqdgzj00q5dk4nzt4o0[.]domain.co<br \/>\n        m<\/td>\n<td>24%<\/td>\n<\/tr>\n<tr>\n<td colspan=\"3\">\n        Table 2. Common families of DNS tunneling seen within customer traffic with typical query<br \/>\n        patterns and their detection rates across open-source security tools\n      <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>*Pupy was seen in our customer traffic, but indirectly through internet scanners. See our work on <a href=\"\/threat-intelligence\/cyber-threat-advisory\/dog-hunt-finding-decoy-dog-toolkit-via-anomalous-dns-traffic\/\" target=\"_self\" rel=\"noopener\"><strong>Decoy Dog<\/strong><\/a>. <\/p>\n<p><a href=\"https:\/\/www.cobaltstrike.com\/\" target=\"_self\" rel=\"noopener\"><strong>Cobalt Strike<\/strong><\/a> is a popular pen test tool which has a DNS C2 module. It is commonly used by red teams and threat actors.<sup>3<\/sup> It uses hex encoded queries with optional and customizable words prepended, such as \u201cpost,\u201d \u201capi,\u201d or \u201cdx.\u201d It performs beaconing using A records and C2, and exfiltration using TXT records. <\/p>\n<p><a href=\"https:\/\/github.com\/iagox86\/dnscat2\" target=\"_blank\" rel=\"noopener\"><strong>DNSCat2<\/strong><\/a> is a lightweight tool designed for creating encrypted DNS tunnels, commonly used by penetration testers and occasionally abused by attackers for stealthy data exfiltration. It is included within METASPLOIT, an open-source pen test tool. DNSCat2 can operate using a variety of query types, including A, TXT, CNAME, and MX records.  <\/p>\n<p><a href=\"https:\/\/github.com\/Arno0x\/DNSExfiltrator\" target=\"_blank\" rel=\"noopener\"><strong>DNS Exfiltrator<\/strong><\/a> is a proof-of-concept tool that encodes data into DNS queries for exfiltration, demonstrating the risks of DNS misuse in real-world scenarios. It uses TXT records, provides only one-directional communication, and is started via the command line. While we have seen this used to test our DNS tunneling detection, we have not seen it used by a threat actor and deem it impractical given the one-directional mechanism. <\/p>\n<p><a href=\"https:\/\/github.com\/BishopFox\/sliver\" target=\"_blank\" rel=\"noopener\"><strong>Sliver<\/strong><\/a> is a cross-platform C2 framework with DNS tunneling capabilities, frequently utilized in adversary simulations and malicious campaigns.  <\/p>\n<p><a href=\"https:\/\/github.com\/facebookarchive\/WEASEL\" target=\"_blank\" rel=\"noopener\"><strong>Weasel<\/strong><\/a> is a less-documented DNS tunneling tool developed by Facebook\u2019s Red Team that supports stealthy data exfiltration and C2, typically used in niche red teaming engagements. It uses A and AAAA records for communications. <\/p>\n<p><a href=\"https:\/\/github.com\/n1nj4sec\/pupy\" target=\"_blank\" rel=\"noopener\"><strong>Pupy<\/strong><\/a> is an open-source, multi-platform RAT with DNS tunneling support, historically leveraged in espionage campaigns against government and corporate entities. It uses A records for communications. <\/p>\n<p><a href=\"https:\/\/github.com\/yarrick\/iodine\" target=\"_blank\" rel=\"noopener\"><strong>Iodine<\/strong><\/a> is a well-known tool for tunneling IPv4 traffic over DNS, used in penetration tests and sometimes abused in attacks, such as by nation-state actors for C2 purposes. Iodine uses A, TXT, CNAME, and MX records to communicate. <\/p>\n<p>One useful observation we made during this study was that all these families had highly unique signatures with the queries and responses they used. We incorporated these signatures at our Threat Defense Recursive DNS Resolver, which allowed us to improve our Threat Insight\u2019s machine learning algorithms from one to two minutes to detect to less than five seconds. This reduces the number of potential queries to less than 10, which eliminates even small amounts of exfiltration.  <\/p>\n<p>In addition to the families described above, we found several other tunnels, including automated and custom pen test tools, anti-virus, anti-spam, as well as DNS tunneling demonstration tools from security vendors. <\/p>\n<p>Antivirus and antispam tools use DNS as a mechanism to determine if a domain or file hash may be malicious. A query may be of the form: \u201c&lt;domain&gt;.&lt;guid&gt;.&lt;avdomain&gt;\u201d or \u201c&lt;file hash&gt;.&lt;guid&gt;.&lt;avdomain&gt;\u201d with response being NXDOMAIN if the domain or file hash is not in a known malware or spam list, or \u201c127.0.0.X\u201d if it is in such a list. One might consider this to be an actual DNS tunnel. In <a href=\"https:\/\/insights.sei.cmu.edu\/library\/detecting-dns-tunneling-using-behavioral-and-content-metadata-features\/\" target=\"_blank\" rel=\"noopener\"><strong>Detecting DNS Tunneling Using Behavioral and Content Metadata Features<\/strong><\/a>, \u200b\u200bwe showed that one could train on such domains and recover tunnels such as Cobalt Strike and DNSCat2. Infoblox maintains lists of antivirus and antispam tools to avoid blocking generally useful tools. We also use them to ensure our machine learning-based tunneling algorithms are sufficiently robust to be able to detect tunnels other than those in our training set. <\/p>\n<p>Several automated pen testing tools, such as <a href=\"https:\/\/cymulate.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Cymulate<\/strong><\/a> and <a href=\"https:\/\/www.attackiq.com\/\" target=\"_blank\" rel=\"noopener\"><strong>AttackIQ<\/strong><\/a>, have appeared. We see these tools\u2019 domains detected on our customer networks regularly. We specifically do not use them for training, add them to block lists or signature them. We rely solely on our machine learning algorithms to detect those domains. <\/p>\n<p>Many customers chose to write their own tools for DNS tunneling to test our software. Most resemble DNS Exfiltrator in that they are one-directional exfiltration channels. Some have taken to using unsuccessful responses, such as NXDomain and SERVFAIL. This requires a careful balancing act as one could also perform tunnel-like queries to legitimate domains and thereby cause the resolver to block all queries to a legitimate domain. To solve this problem, we ensure positive control of the name servers of the domain and otherwise downgrade the detection from DNS tunneling to DNS tunnelling notional, which we recommend such events be logged verse blocked.  <\/p>\n<p>We have seen a few customers attempt to create bidirectional DNS tunneling tests; one interesting find included a detection event for a domain using the queries and responses in Table 3.<\/p>\n<table>\n<thead>\n<tr>\n<th>Query Type<\/th>\n<th>Query Prefix<\/th>\n<th>Query Answer<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>16<\/td>\n<td>cgluzzey.t1.&lt;redacted&gt;<\/td>\n<td>\u201chello\u201d<\/td>\n<\/tr>\n<tr>\n<td>16<\/td>\n<td>cgluzzey.t1.&lt;redacted&gt;<\/td>\n<td>\u201cwhoami\u201d<\/td>\n<\/tr>\n<tr>\n<td>16<\/td>\n<td>cgluzzey.t1.&lt;redacted&gt;<\/td>\n<td>\u201cls -lsa\u201d<\/td>\n<\/tr>\n<tr>\n<td>16<\/td>\n<td>cgluzzey.t1.&lt;redacted&gt;<\/td>\n<td>\u201ccat \/etc\/shadow\u201d<\/td>\n<\/tr>\n<tr>\n<td>1<\/td>\n<td>etrvrq.ciwsldovcnvul3n5c3rlbwq6l3vzci9zymlul25v.t1.&lt;redacted&gt;<\/td>\n<td>12.12.12.3<\/td>\n<\/tr>\n<tr>\n<td>1<\/td>\n<td>jxfszd.mgpetlnfegzpbhryyxrvcgpkbnnwb3quymlucmru.t1.&lt;redacted&gt;<\/td>\n<td>12.12.12.3<\/td>\n<\/tr>\n<tr>\n<td>16<\/td>\n<td>cgluzzey.t1.&lt;redacted&gt;<\/td>\n<td>\u201caGVsbG8\u201d<\/td>\n<\/tr>\n<tr>\n<td colspan=\"3\">Table 3. Example queries from a custom DNS tunnel<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>We performed queries for domains with responses \u201cwhoami,\u201d and discovered two additional domains, which were also detected as tunnels earlier. In total, the unique answers included: \u201chostname\u201d, \u201cls\u201d, \u201caWQ\u201d, \u201cpwd\u201d, \u201cls -lsa\u201d, \u201coa\u201d, \u201cwhoami\u201d, \u201ctest\u201d, \u201chello\u201d, \u201ccat \/etc\/passwd\u201d, \u201cuname -a\u201d, \u201cwhoamid\u201d, \u201cd\u201d, \u201cia\u201d, \u201ccHdk\u201d, \u201cls -lsa \/\u201d, \u201cwhoama\u201d, \u201caGVsbG8\u201d, \u201cwhoamd\u201d, \u201cbHM\u201d, \u201ccat test.txt\u201d, \u201ccat \/etc\/shadow\u201d, \u201coda\u201d,  \u201cls\u201d, \u201cexit\u201d, \u201cao\u201d, \u201cls \/\u201d, \u201ccat test.py\u201d, \u201cid\u201d, \u201cwasdasd\u201d. Later, we saw the domains with the CNAME requests and Base64 encoding. <\/p>\n<p>Finally, we sometimes see our customers use our competitors\u2019 DNS tunneling tools. On September 17, 2024, we observed a domain <span class=\"code-format\">paioaltonetworks[.]tech<\/span> in our DNS exfiltration detection system, Threat Insight. At first, we thought this might be a false positive or the result of a mistyped URL in an application. However, on inspection the queries looked like: <\/p>\n<p><span class=\"code-format\">Mf9q7qgqmy003024muqg4zlxebwgk5tfnrzsa33g.paioaltonetworks[.]tech<\/span><\/p>\n<p><span class=\"code-format\">Mf9q7qgqmy006024or3w64tlebugk4tpmvzs4icp.paioaltonetworks[.]tech<\/span><\/p>\n<p><span class=\"code-format\">Mf9q7qgqmy001024ivwxa33xmvzca6lpovzcasku.paioaltonetworks[.]tech<\/span><\/p>\n<p>In addition, we noticed its name servers were <span class=\"code-format\">ns1.paioaltonetworks[.]tech<\/span> and <span class=\"code-format\">ns2.paioaltonetworks[.]tech<\/span>, and it was registered in January 2024 with OVH.  <\/p>\n<p>Within one minute of the initial queries, the domain was blocked. We then looked at the domain in Domain Tools. Here we noted that domain has a low-risk score of 23 out of 100. This is not particularly odd for domains used in DNS exfiltration, unless there is previously published work on the domain in question. <\/p>\n<p>Domain Tools allows us to dig deeper into investigating the domain in question using a powerful tool: the registration pivot engine. Using the pivot engine, we observed the registrant organization is Efficient IP and there are nine other domains associated with the registrant, including <span class=\"code-format\">rockitwith[.]me<\/span>, <span class=\"code-format\">paioaltonetworks[.]tech<\/span>, <span class=\"code-format\">nicecricket[.]online<\/span>, <span class=\"code-format\">framatech[.]online<\/span>, <span class=\"code-format\">melenchon[.]online<\/span>, <span class=\"code-format\">redfusion[.]xyz<\/span>, <span class=\"code-format\">efficientip[.]io<\/span>, <span class=\"code-format\">dga[.]how<\/span>, <span class=\"code-format\">efficientip[.]net<\/span>, <span class=\"code-format\">efficientip[.]org<\/span>, <span class=\"code-format\">infobiox[.]com<\/span>, <span class=\"code-format\">efficientip[.]it<\/span>, <span class=\"code-format\">efficientip[.]at<\/span>, <span class=\"code-format\">efficientip[.]com<\/span>, and <span class=\"code-format\">dns-blast[.]com<\/span>.  All domains were registered with Ghandi or OVH. <\/p>\n<p>The website <a href=\"https:\/\/www.efficientip.com\" target=\"_blank\" rel=\"noopener\"><strong>https:\/\/www.efficientip.com<\/strong><\/a> advertises Efficient IP, which offers DNS, DHCP, and IP management solutions similar to Infoblox. <\/p>\n<p>We observed that the domains <span class=\"code-format\">rockitwith[.]me<\/span>, <span class=\"code-format\">paioaltonetworks[.]tech<\/span>, and <span class=\"code-format\">nicecricket[.]online<\/span> were all detected as DNS exfiltration by our streaming detection algorithms in Threat Insight and as suspicious\/potential exfiltration by our batch Threat Intel algorithms. <\/p>\n<p>The domains <span class=\"code-format\">melenchon[.]online<\/span>, <span class=\"code-format\">dga[.]how<\/span>,  <span class=\"code-format\">framatech[.]online<\/span>, <span class=\"code-format\">redfusion[.]xyz<\/span>, and <span class=\"code-format\">dns-blast[.]com<\/span> were not seen in Infoblox DNS traffic. Many of these domains have nameservers of the form \u201cns1.exf.&lt;domain&gt;.\u201d This domain structure resembles that of <span class=\"code-format\">hack53[.]shop<\/span>, which was detected as DNS exfiltration in 2022. <\/p>\n<p>Combining DNS exfiltration and lookalike domains is a common tactic used by both malicious actors, such as Side Winder and pen testers, and we have noticed an uptick in the combination in 2024. Infoblox leads the industry in state-of-the-art techniques to detect both these behaviors and more with Infoblox Threat Defense\u2122. <\/p>\n<p>Due to the lookalike nature of <span class=\"code-format\">paioaltonetworks[.]tech<\/span> and <span class=\"code-format\">infobiox[.]com<\/span> we did add these to our suspicious feeds. We continue to rely on our machine learning-based detections for the other Efficient IP domains.<\/p>\n<h3 style=\"font-size: 18px;\">Footnotes:<\/h3>\n<ol style=\"font-size: 14px;\">\n<li><a href=\"https:\/\/www.infoblox.com\/glossary\/dns-tunneling\/\" target=\"_blank\" rel=\"noopener\"><strong>What Is DNS Tunneling?<\/strong><\/a>, Infoblox.<\/li>\n<li><a href=\"https:\/\/insights.sei.cmu.edu\/library\/detecting-dns-tunneling-using-behavioral-and-content-metadata-features\/\" target=\"_blank\" rel=\"noopener\"><strong>Detecting DNS Tunneling Using Behavioral and Content Metadata Features<\/strong><\/a>, Johnson, Darin, Software Engineering Institute, Carnegie Mellon University, February 6, 2023.<\/li>\n<li><a href=\"\/threat-intelligence\/dns-early-detection-cobalt-strike-dns-c2\/\" target=\"_self\" rel=\"noopener\"><strong>DNS Early Detection &#8211; Cobalt Strike DNS C2<\/strong><\/a>, Zuckerman, Michael, Infoblox, March 22, 2024.<\/li>\n<\/ol>\n<p>\u200b\u200b <\/p>\n<style>.code-format {font-family: 'Courier New';}\n.image-caption{font-size: 12px;}\n.list-spacing li{margin-bottom:20px} ol.list-spacing > li::marker {font-weight: 700;}\n.entry-content ul.list-spacing ul > li {list-style-type: square;}\n<\/style>\n<p><script>\njQuery('.single h1').html('<span class=\"gradient\">DNS<\/span>: A Small but Effective C2 system');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authors: Zafir Ansari and Darin Johnson Often referred to as the \u201cphonebook of the internet,\u201d DNS translates domain names into IP addresses, allowing us to navigate the web. Its fundamental role in internet communication means DNS traffic routinely passes through corporate firewalls with minimal inspection. DNS tunneling involves encoding data within DNS queries and responses, [&hellip;]<\/p>\n","protected":false},"author":418,"featured_media":11934,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[247,1004,106,1253,461,1254],"class_list":{"0":"post-11915","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-dns-tunneling","9":"tag-dns-c2","10":"tag-data-exfiltration","11":"tag-bypassing-firewalls","12":"tag-cobalt-strike","13":"tag-detecting-dns-command-and-control","14":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DNS: A Small but Effective C2 system<\/title>\n<meta name=\"description\" content=\"Often referred to as the \u201cphonebook of the internet,\u201d DNS translates domain names into IP addresses, allowing us to navigate the web. Its fundamental role in internet communication means DNS traffic routinely passes through corporate firewalls with minimal inspection.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/dns-a-small-but-effective-c2-system\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DNS: A Small but Effective C2 system\" \/>\n<meta property=\"og:description\" content=\"Often referred to as the \u201cphonebook of the internet,\u201d DNS translates domain names into IP addresses, allowing us to navigate the web. Its fundamental role in internet communication means DNS traffic routinely passes through corporate firewalls with minimal inspection.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/dns-a-small-but-effective-c2-system\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-16T14:55:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-16T17:21:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-a-small-but-effective-c2-system-thumbnail.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Zafir Ansari\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"DNS: A Small but Effective C2 system\" \/>\n<meta name=\"twitter:description\" content=\"Often referred to as the \u201cphonebook of the internet,\u201d DNS translates domain names into IP addresses, allowing us to navigate the web. Its fundamental role in internet communication means DNS traffic routinely passes through corporate firewalls with minimal inspection.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-a-small-but-effective-c2-system-thumbnail.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zafir Ansari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-a-small-but-effective-c2-system\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-a-small-but-effective-c2-system\\\/\"},\"author\":{\"name\":\"Zafir Ansari\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/98c7379e7013c08a1f013133925bb24d\"},\"headline\":\"DNS: A Small but Effective C2 system\",\"datePublished\":\"2025-07-16T14:55:28+00:00\",\"dateModified\":\"2025-07-16T17:21:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-a-small-but-effective-c2-system\\\/\"},\"wordCount\":2368,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-a-small-but-effective-c2-system\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/dns-a-small-but-effective-c2-system-thumbnail.jpg\",\"keywords\":[\"DNS Tunneling\",\"DNS C2\",\"Data Exfiltration\",\"Bypassing Firewalls\",\"Cobalt Strike\",\"Detecting DNS Command and Control\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-a-small-but-effective-c2-system\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-a-small-but-effective-c2-system\\\/\",\"name\":\"DNS: A Small but Effective C2 system\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-a-small-but-effective-c2-system\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-a-small-but-effective-c2-system\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/dns-a-small-but-effective-c2-system-thumbnail.jpg\",\"datePublished\":\"2025-07-16T14:55:28+00:00\",\"dateModified\":\"2025-07-16T17:21:27+00:00\",\"description\":\"Often referred to as the \u201cphonebook of the internet,\u201d DNS translates domain names into IP addresses, allowing us to navigate the web. Its fundamental role in internet communication means DNS traffic routinely passes through corporate firewalls with minimal inspection.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-a-small-but-effective-c2-system\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-a-small-but-effective-c2-system\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-a-small-but-effective-c2-system\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/dns-a-small-but-effective-c2-system-thumbnail.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/dns-a-small-but-effective-c2-system-thumbnail.jpg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-a-small-but-effective-c2-system\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"DNS: A Small but Effective C2 system\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/98c7379e7013c08a1f013133925bb24d\",\"name\":\"Zafir Ansari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/zafir-ansari-headshot-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/zafir-ansari-headshot-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/zafir-ansari-headshot-96x96.jpg\",\"caption\":\"Zafir Ansari\"},\"description\":\"Zafir is a Data Scientist at Infoblox, where he advances the frontiers of AI-powered cybersecurity through both product development and fundamental research. His work ranges from building production threat detection systems to exploring novel approaches that push the boundaries of network security\u2014employing everything from neural networks to graph algorithms. Before joining Infoblox in 2024, Zafir completed his Master's degree at Northwestern University on a full fellowship, conducting research at the intersection of internet measurement and artificial intelligence. He previously contributed to cutting-edge research at the Internet Security and Privacy Lab.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/zafir-ansari\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DNS: A Small but Effective C2 system","description":"Often referred to as the \u201cphonebook of the internet,\u201d DNS translates domain names into IP addresses, allowing us to navigate the web. Its fundamental role in internet communication means DNS traffic routinely passes through corporate firewalls with minimal inspection.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/dns-a-small-but-effective-c2-system\/","og_locale":"en_US","og_type":"article","og_title":"DNS: A Small but Effective C2 system","og_description":"Often referred to as the \u201cphonebook of the internet,\u201d DNS translates domain names into IP addresses, allowing us to navigate the web. Its fundamental role in internet communication means DNS traffic routinely passes through corporate firewalls with minimal inspection.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/dns-a-small-but-effective-c2-system\/","og_site_name":"Infoblox Blog","article_published_time":"2025-07-16T14:55:28+00:00","article_modified_time":"2025-07-16T17:21:27+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-a-small-but-effective-c2-system-thumbnail.jpg","type":"image\/jpeg"}],"author":"Zafir Ansari","twitter_card":"summary_large_image","twitter_title":"DNS: A Small but Effective C2 system","twitter_description":"Often referred to as the \u201cphonebook of the internet,\u201d DNS translates domain names into IP addresses, allowing us to navigate the web. Its fundamental role in internet communication means DNS traffic routinely passes through corporate firewalls with minimal inspection.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-a-small-but-effective-c2-system-thumbnail.jpg","twitter_misc":{"Written by":"Zafir Ansari","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-a-small-but-effective-c2-system\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-a-small-but-effective-c2-system\/"},"author":{"name":"Zafir Ansari","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/98c7379e7013c08a1f013133925bb24d"},"headline":"DNS: A Small but Effective C2 system","datePublished":"2025-07-16T14:55:28+00:00","dateModified":"2025-07-16T17:21:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-a-small-but-effective-c2-system\/"},"wordCount":2368,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-a-small-but-effective-c2-system\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-a-small-but-effective-c2-system-thumbnail.jpg","keywords":["DNS Tunneling","DNS C2","Data Exfiltration","Bypassing Firewalls","Cobalt Strike","Detecting DNS Command and Control"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-a-small-but-effective-c2-system\/","url":"https:\/\/www.infoblox.com\/blog\/security\/dns-a-small-but-effective-c2-system\/","name":"DNS: A Small but Effective C2 system","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-a-small-but-effective-c2-system\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-a-small-but-effective-c2-system\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-a-small-but-effective-c2-system-thumbnail.jpg","datePublished":"2025-07-16T14:55:28+00:00","dateModified":"2025-07-16T17:21:27+00:00","description":"Often referred to as the \u201cphonebook of the internet,\u201d DNS translates domain names into IP addresses, allowing us to navigate the web. Its fundamental role in internet communication means DNS traffic routinely passes through corporate firewalls with minimal inspection.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-a-small-but-effective-c2-system\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/dns-a-small-but-effective-c2-system\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-a-small-but-effective-c2-system\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-a-small-but-effective-c2-system-thumbnail.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-a-small-but-effective-c2-system-thumbnail.jpg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-a-small-but-effective-c2-system\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"DNS: A Small but Effective C2 system"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/98c7379e7013c08a1f013133925bb24d","name":"Zafir Ansari","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/zafir-ansari-headshot-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/zafir-ansari-headshot-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/zafir-ansari-headshot-96x96.jpg","caption":"Zafir Ansari"},"description":"Zafir is a Data Scientist at Infoblox, where he advances the frontiers of AI-powered cybersecurity through both product development and fundamental research. His work ranges from building production threat detection systems to exploring novel approaches that push the boundaries of network security\u2014employing everything from neural networks to graph algorithms. Before joining Infoblox in 2024, Zafir completed his Master's degree at Northwestern University on a full fellowship, conducting research at the intersection of internet measurement and artificial intelligence. He previously contributed to cutting-edge research at the Internet Security and Privacy Lab.","url":"https:\/\/www.infoblox.com\/blog\/author\/zafir-ansari\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/11915","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/418"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=11915"}],"version-history":[{"count":29,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/11915\/revisions"}],"predecessor-version":[{"id":11953,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/11915\/revisions\/11953"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/11934"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=11915"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=11915"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=11915"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}