{"id":3455,"date":"2016-04-26T17:15:30","date_gmt":"2016-04-26T17:15:30","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=3455"},"modified":"2025-04-01T12:25:32","modified_gmt":"2025-04-01T19:25:32","slug":"analysis-on-popular-dns-tunneling-tools","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/analysis-on-popular-dns-tunneling-tools\/","title":{"rendered":"Analysis on Popular DNS Tunneling Tools"},"content":{"rendered":"<p>In the past few years, I did some in-depth research and analysis on many popular DNS tunneling tools<sup>[1]<\/sup>\u00a0including DNS2TCP<sup>[2]<\/sup>, TCP-over-DNS, OzymanDNS, Iodine, SplitBrain, DNScat-P\/DNScat2, DNScapy, TUNS, PSUDP, YourFreedom etc. Although most DNS Tunneling tools are implemented in different languages and\/or may have different features and settings, they share the same concept and achieve the same goal, which is trying to bypass the traditional IPS or firewall inspection and network security policy to reach the Internet. They can do data exfiltration by relaying TCP connections over <a href=\"https:\/\/www.infoblox.com\/glossary\/dns-tunneling\/\" target=\"_blank\"><strong>DNS tunneling<\/strong><\/a>, which is hard to detect and block.<\/p>\n<p>In this blog, I will show my work on one of the\u00a0<a href=\"https:\/\/www.infoblox.com\/products\/threat-insight\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_self\" rel=\"nofollow noopener noreferrer\">DNS tunneling tools<\/a>, DNS2TCP, to explain how DNS tunneling works and analyze its network traffic pattern\/behaviors. DNS2TCP is one of data exfiltration tools that supports SSH, SMTP, POP and other TCP connections over DNS protocol.<\/p>\n<h1 id=\"toc-hId--1092933738\">1 DNS2TCP Test-bed Setup<\/h1>\n<h2 id=\"toc-hId-678505748\">1.1\u00a0\u00a0\u00a0\u00a0\u00a0 How DNS2TCP works<\/h2>\n<p>Like most tunneling technologies, DNS2TCP requires a public domain which can be used for the DNS tunneling. Once a public domain is configured and DNS2TCP software is installed, we can start DNS2TCP tool to run SSH\/POP\/SMTP or any other applications.<\/p>\n<p>Figure 1 shows the detailed steps on how DNS2TCP works.<\/p>\n<ol>\n<li>Start DNS2TCP client from the laptop (in our setup, the IP address is 192.168.212.71), which has a default DNS server configuration (in our setup, the IP address is 192.168.212.11). When a user configures the DNS2TCP and starts an SSH session, the DNS2TCP client software will encapsulate SSH payloads into multiple subdomains on the pre-configured public tunneling domain and send these DNS subdomain requests to DNS server.<\/li>\n<li>Most domains can be resolved by DNS server without any issue, but for the DNS tunneling domain, (in our setup, I am using a fake domain, dns2tcp.tunnel.srt.blox), the DNS server cannot resolve them and will forward the request to the DNS2TCP server (the IP address is 192.168.212.81).<\/li>\n<li>The DNS2TCP server receives the DNS request, decapsulates the payload, and uses as a proxy to connect to the Internet resource. In our testbed, I setup an SSH server (192.168.212.91) as Internet resource.<\/li>\n<li>Then Internet resource responds to the request and sends the payload to the DNS2TCP server.<\/li>\n<li>The DNS2TCP server encapsulates the response payload from the Internet into DNS response packet, and sends back to the DNS2TCP client. The DNS2TCP client receives the DNS response traffic and decapsulates them. Then the client is able to receive all the response traffic from the Internet resource.<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3462\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/how-dns2tcp-works.jpg\" alt=\"Figure 1. How DNS2TCP works\" width=\"313\" height=\"354\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/how-dns2tcp-works.jpg 313w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/how-dns2tcp-works-265x300.jpg 265w\" sizes=\"auto, (max-width: 313px) 100vw, 313px\" \/><\/p>\n<p>Figure 1. How DNS2TCP works<\/p>\n<h2 id=\"toc-hId-707134899\">1.2\u00a0\u00a0\u00a0\u00a0\u00a0 Testbed Topology<\/h2>\n<p>I used Fedora release 12 as a host machine, and installed VMware Workstation 11. I setup the whole testbed using the VMware workstation guests. I created four guests below:<\/p>\n<ol>\n<li>DNS2TCP client, which is an Ubuntu OS guest using network adaptor as NAT (i.e. vmnet8). Inside the Ubuntu, network address is statically configured as 192.168.212.81, and the network nameserver is configured as 192.168.212.11. The package DNS2TCP is installed.<\/li>\n<li>DNS2TCP server, which is also an Ubuntu OS guest using network adaptor as NAT(i.e., vmnet8). It has almost the same configuration as DNS client, but IP address is configured as 192.168.212.71. The package DNS2TCP is also installed on this machine.<\/li>\n<li>Internet Resource (SSH Server), which is an Ubuntu OS guest as well. It serves as an Internet resource, and has SSH server, SMTP server and HTTP server installed. It has the same DNS nameserver configured, 192.168.212.11, and its static IP address is 192.168.212.91.<\/li>\n<li>DNS Server. I use Infoblox vNIOS as the DNS server. It has a static network IP address, 192.168.212.11. I add a special DNS zone, dns2tcp.tunnel.srt.blox, for the DNS tunneling use. It is configured as a forward zone, which forwards DNS queries to DNS2TCP server, 192.168.212.71. The configuration is shown in Figure 2.<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3459\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/dns-tunneling-domain.jpg\" alt=\"Figure 2: DNS tunneling domain: dns2tcp.tunnel.srt.blox\" width=\"408\" height=\"174\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-tunneling-domain.jpg 408w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-tunneling-domain-300x128.jpg 300w\" sizes=\"auto, (max-width: 408px) 100vw, 408px\" \/><\/p>\n<p>Figure 2: DNS tunneling domain: dns2tcp.tunnel.srt.blox<\/p>\n<h2 id=\"toc-hId-735764050\">1.3 DNS2TCP Installation and Configuration<\/h2>\n<ol>\n<li>DNS2TCP Server<\/li>\n<\/ol>\n<p>First I install dns2tcp package in the Ubuntu guest OS.<\/p>\n<p>apt-get install dns2tcp<\/p>\n<p>Then I configure the DNS2TCP server options. The listing IP address is its local network interface 192.168.212.71, and the port number is the DNS port tcp\/53. The domain we will use for DNS tunnel is dns2tcp.tunnel.srt.blox.<\/p>\n<p>Since the DNS2TCP server has an IP address is 192.168.212.71, we put the listing IP address on this interface, and port number to be 53. \u00a0In this study, I only focus on SSH session over DNS tunneling.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3457\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/dns2tcp-server-config.jpg\" alt=\"Figure 3. \u00a0Configuration on DNS2TCP Server\" width=\"423\" height=\"105\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns2tcp-server-config.jpg 423w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns2tcp-server-config-300x74.jpg 300w\" sizes=\"auto, (max-width: 423px) 100vw, 423px\" \/><\/p>\n<p>Figure 3. \u00a0Configuration on DNS2TCP Server<\/p>\n<p>Last, I start DNS tunneling daemon by running the command below.<\/p>\n<p>dns2tcpd \u2013F \u2013d 3 \u2013f config.dns2tcp.tunel.srt.blox.txt<\/p>\n<ol start=\"2\">\n<li>DNS2TCP Client<\/li>\n<\/ol>\n<p>Similar to DNS2TCP server, first we need to install dns2tcp package in the Ubuntu guest OS. Second we configure the DNS2TCP client as follows.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3456\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/dns2tcp-client-config.jpg\" alt=\"Figure 4. Configuration on DNS2TCP Client\" width=\"366\" height=\"107\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns2tcp-client-config.jpg 366w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns2tcp-client-config-300x88.jpg 300w\" sizes=\"auto, (max-width: 366px) 100vw, 366px\" \/><\/p>\n<p>Figure 4. Configuration on DNS2TCP Client<\/p>\n<p>At last, we run DNS2TCP application as proxy in the client,<\/p>\n<p>dns2tcpc \u2013d 3 \u2013f config.dns2tcp-client.txt<\/p>\n<p>Now, we can start SSH session to the SSH server 192.168.212.91 using DNS tunneling.<\/p>\n<p>ssh jxia@127.0.0.1 \u2013p 2222 \u2013D 8081<\/p>\n<p>It should be able to connect to the SSH server through DNS tunneling channel.<\/p>\n<h1 id=\"toc-hId--978417134\">2\u00a0DNS2TCP Network Capture<\/h1>\n<h2 id=\"toc-hId-793022352\">2.1\u00a0\u00a0\u00a0\u00a0\u00a0 Wireshark<\/h2>\n<p>I install Wireshark pcap tool<sup>\u00a0[3]<\/sup>\u00a0on the DNS2TCP client to capture all the traffic that we have seen during the experiments. In order to reduce the noise and irrelevant packets, I apply capture-filters in Wireshark and only capture the DNS traffic on port 53 on the network interface.<\/p>\n<h2 id=\"toc-hId-821651503\">2.2\u00a0\u00a0\u00a0\u00a0\u00a0 Testing Cases<\/h2>\n<p>In order to study the DNS tunneling traffic on different use cases and scenarios, I captured the DNS2TCP tunneling traffic for the following testing cases:<\/p>\n<ul>\n<li>Handshake between DNS2TCP client and DNS2TCP server without any applications.<\/li>\n<li>A single SSH session when DNS2TCP has no key configured.<\/li>\n<li>A single SSH session when DNS2TCP has a wrong key configured.<\/li>\n<li>A single SSH session when DNS2TCP has a correct key configured.<\/li>\n<li>Multiple SSH sessions when DNS2TCP has correct key configured.<\/li>\n<\/ul>\n<p>To avoid possible bias or unexpected network issues, I repeated the above testing scenarios at least 5 times and collected their network pcaps respectively. Also I entered various shell commands for SSH sessions when DNS2TCP tunnel is connected.<\/p>\n<h2 id=\"toc-hId-850280654\">2.3\u00a0\u00a0\u00a0\u00a0\u00a0 Pcap Archives<\/h2>\n<p>During my study, I have collected 18 pcaps on different testing cases. The size of the pcap is from 690 bytes to 460 KBytes. The pcap list is shown in the Figure 5 below. The naming convention is roughly like [ToolName]-[Application]-[Retry]-[TestingScenarios].pcap. Please note that, traffic on multiple DNS2TCP handshake experiments is captured within one pcap.<\/p>\n<p>Figure 6 also shows the DNS tunneling traffic in details. We can see that there are quite a number of DNS queries on dns2tcp.tunnel.srt.blox, which actually are DNS traffic that encapsulates SSH session over DNS tunneling.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3461\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/list-captured-traffic.jpg\" alt=\"Figure 5. List of captured traffic\" width=\"335\" height=\"220\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/list-captured-traffic.jpg 335w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/list-captured-traffic-300x197.jpg 300w\" sizes=\"auto, (max-width: 335px) 100vw, 335px\" \/><\/p>\n<p>Figure 5. List of captured traffic<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3460\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/dns-tunneling-traffic.jpg\" alt=\"Figure 6. DNS tunneling traffic\" width=\"468\" height=\"306\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-tunneling-traffic.jpg 468w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/dns-tunneling-traffic-300x196.jpg 300w\" sizes=\"auto, (max-width: 468px) 100vw, 468px\" \/><\/p>\n<p>Figure 6. DNS tunneling traffic<\/p>\n<h1 id=\"toc-hId--863900530\">3 Analysis on DNS2TCP Traffic<\/h1>\n<h2 id=\"toc-hId-907538956\">3.1\u00a0\u00a0\u00a0\u00a0\u00a0 Encode\/Decode Method<\/h2>\n<p>DNS2TCP tool uses base64 encode\/decode algorithm to encapsulate\/decapsulate the SSH traffic into DNS query request\/response.<\/p>\n<p>Base64 is one of encode\/decode algorithms to convert binary format data into text format data. It is commonly used in SMTP attachment. The detailed information can be found at wiki page\u00a0<sup>[4]<\/sup>.<\/p>\n<h2 id=\"toc-hId--363467904\">3.2\u00a0\u00a0\u00a0\u00a0\u00a0 DNS Tunneling Packets<\/h2>\n<p>Here are some samples of DNS packets that we captured in DNS tunneling session.<\/p>\n<p><em>\u00a0 1\u00a0\u00a0 0.000000 192.168.212.81 -&gt; 192.168.212.71 DNS Standard query TXT AAAAAPlbAA.=auth.dns2tcp.tunnel.srt.blox<\/em><\/p>\n<p><em>\u00a0 2\u00a0\u00a0 0.003993 192.168.212.71 -&gt; 192.168.212.81 DNS Standard query response TXT<\/em><\/p>\n<p><em>\u00a0 3\u00a0\u00a0 0.004040 192.168.212.81 -&gt; 192.168.212.71 DNS Standard query TXT hn+FgAABADEzMjFGMjRCQTgyMUVCNzM4MjdGNUM0RjU1NzVGMjJFMkJBNTUxMUU.=auth.dns2tcp.tunnel.srt.blox<\/em><\/p>\n<p><em>\u00a0 4\u00a0\u00a0 0.005772 192.168.212.71 -&gt; 192.168.212.81 DNS Standard query response TXT<\/em><\/p>\n<p><em>\u00a0 5\u00a0\u00a0 0.005794 192.168.212.81 -&gt; 192.168.212.71 DNS Standard query TXT hn8Tv9+PAHNzaA.=connect.dns2tcp.tunnel.srt.blox<\/em><\/p>\n<p><em>\u00a0 6\u00a0\u00a0 0.016487 192.168.212.71 -&gt; 192.168.212.81 DNS Standard query response TXT<\/em><\/p>\n<p><em>\u00a0 7\u00a0\u00a0 0.016698 192.168.212.81 -&gt; 192.168.212.71 DNS Standard query TXT hn8AAAABBA.dns2tcp.tunnel.srt.blox<\/em><\/p>\n<p><em>\u00a0 8\u00a0\u00a0 0.016747 192.168.212.81 -&gt; 192.168.212.71 DNS Standard query TXT hn8AAAACCFNTSC0yLjAtT3BlblNTSF82LjYuMXAxIFVidW50dS0ydWJ1bnR1Mg0.K.dns2tcp.tunnel.srt.blox<\/em><\/p>\n<p><em>\u00a0 9\u00a0\u00a0 0.016776 192.168.212.81 -&gt; 192.168.212.71 DNS Standard query TXT hn8AAAADBA.dns2tcp.tunnel.srt.blox<\/em><\/p>\n<p><em>\u00a010\u00a0\u00a0 0.027635 192.168.212.71 -&gt; 192.168.212.81 DNS Standard query response TXT<\/em><\/p>\n<p><em>\u00a011\u00a0\u00a0 0.027713 192.168.212.81 -&gt; 192.168.212.71 DNS Standard query TXT hn8AAQAEBA.dns2tcp.tunnel.srt.blox<\/em><\/p>\n<p><em>\u00a012\u00a0\u00a0 0.027999 192.168.212.81 -&gt; 192.168.212.71 DNS Standard query TXT hn8AAAAFCAAAB6wIFH\/YzMOkC0BJ0kmaj8GQ3TIAAADUY3VydmUyNTUxOS1zaGE.yNTZAbGlic3NoLm9yZyxlY2RoLXNoY<\/em><\/p>\n<p><em>TItbmlzdHAyNTYsZWNkaC1zaGEyLW5pc3.RwMzg0LGVjZGgtc2hhMi1uaXN0cDUyMSxkaWZmaWUt.dns2tcp.tunnel.srt.blox<\/em><\/p>\n<p><em>\u00a013\u00a0\u00a0 0.028038 192.168.212.81 -&gt; 192.168.212.71 DNS Standard query TXT hn8AAAAGBA.dns2tcp.tunnel.srt.blox<\/em><\/p>\n<p><em>\u00a014\u00a0\u00a0 0.028062 192.168.212.81 -&gt; 192.168.212.71 DNS Standard query TXT hn8AAAAHCGhlbGxtYW4tZ3JvdXAtZXhjaGFuZ2Utc2hhMjU2LGRpZmZpZS1oZWx.sbWFuLWdyb3VwLWV4Y2hhbmdlLXNoY<\/em><\/p>\n<p><em>TEsZGlmZmllLWhlbGxtYW4tZ3JvdXAxNC.1zaGExLGRpZmZpZS1oZWxsbWFuLWdyb3VwMS1zaGEx.dns2tcp.tunnel.srt.blox<\/em><\/p>\n<p><em>\u00a015\u00a0\u00a0 0.028083 192.168.212.81 -&gt; 192.168.212.71 DNS Standard query TXT hn8AAAAIBA.dns2tcp.tunnel.srt.blox<\/em><\/p>\n<p><em>\u00a016\u00a0\u00a0 0.028104 192.168.212.81 -&gt; 192.168.212.71 DNS Standard query TXT hn8AAAAJCAAAAWdlY2RzYS1zaGEyLW5pc3RwMjU2LWNlcnQtdjAxQG9wZW5zc2g.uY29tLGVjZHNhLXNoYTItbmlzdHAzO<\/em><\/p>\n<p><em>DQtY2VydC12MDFAb3BlbnNzaC5jb20sZW.Nkc2Etc2hhMi1uaXN0cDUyMS1jZXJ0LXYwMUBvcGVu.dns2tcp.tunnel.srt.blox<\/em><\/p>\n<p><em>\u00a017\u00a0\u00a0 0.028125 192.168.212.81 -&gt; 192.168.212.71 DNS Standard query TXT hn8AAAAKBA.dns2tcp.tunnel.srt.blox<\/em><\/p>\n<p><em>\u00a018\u00a0\u00a0 0.028146 192.168.212.81 -&gt; 192.168.212.71 DNS Standard query TXT hn8AAAALCHNzaC5jb20sc3NoLWVkMjU1MTktY2VydC12MDFAb3BlbnNzaC5jb20.sc3NoLXJzYS1jZXJ0LXYwMUBvcGVuc<\/em><\/p>\n<p><em>3NoLmNvbSxzc2gtZHNzLWNlcnQtdjAxQG.9wZW5zc2guY29tLHNzaC1yc2EtY2VydC12MDBAb3Bl.dns2tcp.tunnel.srt.blox<\/em><\/p>\n<p><em>\u00a019\u00a0\u00a0 0.028166 192.168.212.81 -&gt; 192.168.212.71 DNS Standard query TXT hn8AAAAMBA.dns2tcp.tunnel.srt.blox<\/em><\/p>\n<p><em>\u00a020\u00a0\u00a0 0.028187 192.168.212.81 -&gt; 192.168.212.71 DNS Standard query TXT hn8AAAANCG5zc2guY29tLHNzaC1kc3MtY2VydC12MDBAb3BlbnNzaC5jb20sZWN.kc2Etc2hhMi1uaXN0cDI1NixlY2RzY<\/em><\/p>\n<p><em>S1zaGEyLW5pc3RwMzg0LGVjZHNhLXNoYT.ItbmlzdHA1MjEsc3NoLWVkMjU1MTksc3NoLXJzYSxz.dns2tcp.tunnel.srt.blox<\/em><\/p>\n<p>The first few DNS queries should be the encapsulations on TCP\/SSH handshakes. The remaining part from packet #8 should be the real content of SSH payload. Here are some observations from all the pcaps we collected:<\/p>\n<ul>\n<li>DNS2TCP uses the fixed subdomain for the TCP\/SSH handshakes. That is, .=auth., .=connect.. We can see the subdomains in the packet #1, #3, #5.<\/li>\n<li>DNS2TCP uses the first 4 bytes of subdomain to maintain and track the same session. For example, hn8A is used for the flow here. We can see that each DNS query, they always start with hn8A in this flow. We call it as\u00a0<strong><em>session-tag<\/em><\/strong>.<\/li>\n<li>DNS2TCP uses base64 for encode\/decode method. By removing\u00a0<strong><em>session-tag<\/em><\/strong>, we can use base64 to decode the pattern in packet #8. Figure 7 shows the real payload in SSH session after the decoding. We can see \u201cSSH-2.0-OpenSSH_\u201d text inside.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3458\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/dns-query-domain-based64-decode.jpg\" alt=\"Figure 7. DNS query domain after Based64 decode\" width=\"256\" height=\"297\" \/><\/p>\n<p>Figure 7. DNS query domain after Based64 decode<\/p>\n<h2 id=\"toc-hId--334838753\">3.3\u00a0\u00a0\u00a0\u00a0\u00a0 DNS2TCP Tunneling FLow<\/h2>\n<p>As I mentioned above, DNS2TCP has a\u00a0<strong><em>session-tag<\/em><\/strong>\u00a0to track each flow. It would be a good indicator for us to cluster various DNS2TCP queries into their own corresponding sessions.<\/p>\n<p>Beside the\u00a0<strong><em>session-tag\u00a0<\/em><\/strong>we observed, we also find that,<\/p>\n<ul>\n<li>DNS2TCP has a high query rate on the same tunneling domain, and\/or high volume of the subdomain names.<\/li>\n<li>DNS2TCP has a high number of unique subdomains over a short period.<\/li>\n<li>Length of subdomain name is quite long, which varies from 50 to 160 bytes.<\/li>\n<li>Some specific characters such as \u201c+\u201d, \u201c\/\u201d also appear in the subdomain name.<\/li>\n<\/ul>\n<h1 id=\"toc-hId-1501244861\">4 Suggestion for DNS2TCP Tunnel Detection<\/h1>\n<p>Based on our observation in Chapter 3, I will provide some <a href=\"https:\/\/www.infoblox.com\/products\/threat-intel\/\" target=\"_blank\"><strong>threat intel<\/strong><\/a> and suggestions for the DNS2TCP tunneling detection. However, please note that in this blog we only demonstrate the results on SSH session over DNS2TCP tunneling. For other applications in SMTP or POP3, we can apply the same techniques to analyze the network traffic patterns on the corresponding protocols and develop similar rules for the DNS2TCP detection.<\/p>\n<h2 id=\"toc-hId--277580451\">4.1\u00a0\u00a0\u00a0\u00a0\u00a0 Payload Detection<\/h2>\n<h3 id=\"toc-hId--2056405763\">4.1.1\u00a0\u00a0\u00a0\u00a0\u00a0 Detection for new DNS2TCP negotiation<\/h3>\n<p>We inspect the DNS query name and find the subdomain field on \u201c=auth\u201d\u00a0 and \u201c=connect\u201d.<\/p>\n<p>AAAAAPlbAA<strong>.=auth<\/strong>.dns2tcp.tunnel.srt.blox<\/p>\n<p>hn+FgAABADEzMjFGMjRCQTgyMUVCNzM4MjdGNUM0RjU1NzVGMjJFMkJBNTUxMUU<strong>.=auth<\/strong>.dns2tcp.tunnel.srt.blox<\/p>\n<p>hn8Tv9+PAHNzaA<strong>.=connect<\/strong>.dns2tcp.tunnel.srt.blox<\/p>\n<h3 id=\"toc-hId--2027776612\">4.1.2\u00a0\u00a0\u00a0\u00a0\u00a0 Detection for SSH negotiation<\/h3>\n<p>For each SSH connection, there will be \u201cSSH-2.0\u201d string from client to indicate it is SSH 2.0 session. We can look base64 encoding on this string pattern. So we can inspect the DNS query name to find \u201cFNTSC0yLjAt\u201d in the subdomain field.<\/p>\n<p>hn8AAAACC<strong>FNTSC0yLjAt<\/strong>T3BlblNTSF82LjYuMXAxIFVidW50dS0ydWJ1bnR1Mg0.K.dns2tcp.tunnel.srt.blox<\/p>\n<h2 id=\"toc-hId--191692998\">4.2\u00a0\u00a0\u00a0\u00a0\u00a0 Machine-Learning Analytics-based Detection<\/h2>\n<p>Infoblox released NIOS 7.3 which introduced <a href=\"https:\/\/www.infoblox.com\/products\/threat-defense\/\" target=\"_blank\"><strong>threat defense<\/strong><\/a> and DNS Threat Analytics for Data Exfiltration Prevention early this year in 2016. For most DNS tunneling tools, <a href=\"https:\/\/www.infoblox.com\/products\/advanced-dns-protection\/\" target=\"_blank\"><strong>Advanced DNS protection<\/strong><\/a> with Infoblox&#8217;s ADP product and NIOS 7.3 or above can detect and block most DNS tunneling behaviors. Please refer to our Infoblox product\u00a0<sup>[5]\u00a0<\/sup>and Infoblox blog pages\u00a0<sup>[6]<\/sup>\u00a0for details.<\/p>\n<h1 id=\"toc-hId-1644390616\">5\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Summary<\/h1>\n<p>In this blog, I used DNS2TCP as an example to show our study on DNS tunneling tools. The research process on other DNS tunneling tools should be similar, although they might have different configurations and features. In general, we need to setup a testbed for the DNS tunneling tools, try to run it and capture some DNS tunneling traffic, and then analyze the network traffic to get their DNS subdomain patterns and\/or DNS query behaviors.<\/p>\n<h1 id=\"toc-hId-1673019767\">6\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 References<\/h1>\n<ol>\n<li>Greg Farnham, Detecting DNS Tunneling, 2013, by the SANS Institute.\u00a0<a href=\"http:\/\/www.sans.org\/reading-room\/whitepapers\/dns\/detecting-dns-tunneling-34152\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">http:\/\/www.sans.org\/reading-room\/whitepapers\/dns\/detecting-dns-tunneling-34152<\/a>,<\/li>\n<li>DNS2TCP Tool,\u00a0<a href=\"http:\/\/www.aldeid.com\/wiki\/Dns2tcp\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">http:\/\/www.aldeid.com\/wiki\/Dns2tcp<\/a><\/li>\n<li>Wireshark Tool,\u00a0<a href=\"https:\/\/www.wireshark.org\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https:\/\/www.wireshark.org\/<\/a><\/li>\n<li>Base64,\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/Base64\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">http:\/\/en.wikipedia.org\/wiki\/Base64<\/a><\/li>\n<li>Infoblox Advanced DNS Protection,\u00a0<a href=\"https:\/\/www.infoblox.com\/products\/secure-dns\/advanced-dns-protection?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https:\/\/www.infoblox.com\/products\/secure-dns\/advanced-dns-protection<\/a><\/li>\n<li>Introducing DNS Threat Analytics for Data Exfiltration Prevention,\u00a0<a href=\"https:\/\/community.infoblox.com\/t5\/Community-Blog\/Introducing-DNS-Threat-Analytics-for-Data-Exfiltration\/ba-p\/4857\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/community.infoblox.com\/t5\/Community-Blog\/Introducing-DNS-Threat-Analytics-for-Data-Exfiltrat&#8230;<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>In the past few years, I did some in-depth research and analysis on many popular DNS tunneling tools[1]\u00a0including DNS2TCP[2], TCP-over-DNS, OzymanDNS, Iodine, SplitBrain, DNScat-P\/DNScat2, DNScapy, TUNS, PSUDP, YourFreedom etc. Although most DNS Tunneling tools are implemented in different languages and\/or may have different features and settings, they share the same concept and achieve the same [&hellip;]<\/p>\n","protected":false},"author":284,"featured_media":1797,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[16,15],"class_list":{"0":"post-3455","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-infoblox","9":"tag-security","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Analysis on Popular DNS Tunneling Tools<\/title>\n<meta name=\"description\" content=\"DNS tunneling tools have a variety of uses. Learn about how these tools work and the the various exfiltration tools supported over DNS protocols here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/analysis-on-popular-dns-tunneling-tools\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Analysis on Popular DNS Tunneling Tools\" \/>\n<meta property=\"og:description\" content=\"DNS tunneling tools have a variety of uses. Learn about how these tools work and the the various exfiltration tools supported over DNS protocols here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/analysis-on-popular-dns-tunneling-tools\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-26T17:15:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-01T19:25:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-29.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jianhong Xia\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jianhong Xia\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/analysis-on-popular-dns-tunneling-tools\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/analysis-on-popular-dns-tunneling-tools\\\/\"},\"author\":{\"name\":\"Jianhong Xia\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/49789dcc5bf54ec919ed2c0c61b92f31\"},\"headline\":\"Analysis on Popular DNS Tunneling Tools\",\"datePublished\":\"2016-04-26T17:15:30+00:00\",\"dateModified\":\"2025-04-01T19:25:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/analysis-on-popular-dns-tunneling-tools\\\/\"},\"wordCount\":2234,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/analysis-on-popular-dns-tunneling-tools\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-29.jpg\",\"keywords\":[\"Infoblox\",\"Security\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/analysis-on-popular-dns-tunneling-tools\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/analysis-on-popular-dns-tunneling-tools\\\/\",\"name\":\"Analysis on Popular DNS Tunneling Tools\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/analysis-on-popular-dns-tunneling-tools\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/analysis-on-popular-dns-tunneling-tools\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-29.jpg\",\"datePublished\":\"2016-04-26T17:15:30+00:00\",\"dateModified\":\"2025-04-01T19:25:32+00:00\",\"description\":\"DNS tunneling tools have a variety of uses. Learn about how these tools work and the the various exfiltration tools supported over DNS protocols here.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/analysis-on-popular-dns-tunneling-tools\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/analysis-on-popular-dns-tunneling-tools\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/analysis-on-popular-dns-tunneling-tools\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-29.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-29.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/analysis-on-popular-dns-tunneling-tools\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Analysis on Popular DNS Tunneling Tools\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/49789dcc5bf54ec919ed2c0c61b92f31\",\"name\":\"Jianhong Xia\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/85dbc64b40c142e128319a362e09cea5a4ebacb66ed05fdabcf5edb49c362230?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/85dbc64b40c142e128319a362e09cea5a4ebacb66ed05fdabcf5edb49c362230?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/85dbc64b40c142e128319a362e09cea5a4ebacb66ed05fdabcf5edb49c362230?s=96&d=blank&r=g\",\"caption\":\"Jianhong Xia\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/jianhong-xia\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Analysis on Popular DNS Tunneling Tools","description":"DNS tunneling tools have a variety of uses. Learn about how these tools work and the the various exfiltration tools supported over DNS protocols here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/analysis-on-popular-dns-tunneling-tools\/","og_locale":"en_US","og_type":"article","og_title":"Analysis on Popular DNS Tunneling Tools","og_description":"DNS tunneling tools have a variety of uses. Learn about how these tools work and the the various exfiltration tools supported over DNS protocols here.","og_url":"https:\/\/www.infoblox.com\/blog\/community\/analysis-on-popular-dns-tunneling-tools\/","og_site_name":"Infoblox Blog","article_published_time":"2016-04-26T17:15:30+00:00","article_modified_time":"2025-04-01T19:25:32+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-29.jpg","type":"image\/jpeg"}],"author":"Jianhong Xia","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jianhong Xia","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/analysis-on-popular-dns-tunneling-tools\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/analysis-on-popular-dns-tunneling-tools\/"},"author":{"name":"Jianhong Xia","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/49789dcc5bf54ec919ed2c0c61b92f31"},"headline":"Analysis on Popular DNS Tunneling Tools","datePublished":"2016-04-26T17:15:30+00:00","dateModified":"2025-04-01T19:25:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/analysis-on-popular-dns-tunneling-tools\/"},"wordCount":2234,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/analysis-on-popular-dns-tunneling-tools\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-29.jpg","keywords":["Infoblox","Security"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/analysis-on-popular-dns-tunneling-tools\/","url":"https:\/\/www.infoblox.com\/blog\/community\/analysis-on-popular-dns-tunneling-tools\/","name":"Analysis on Popular DNS Tunneling Tools","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/analysis-on-popular-dns-tunneling-tools\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/analysis-on-popular-dns-tunneling-tools\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-29.jpg","datePublished":"2016-04-26T17:15:30+00:00","dateModified":"2025-04-01T19:25:32+00:00","description":"DNS tunneling tools have a variety of uses. Learn about how these tools work and the the various exfiltration tools supported over DNS protocols here.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/analysis-on-popular-dns-tunneling-tools\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/analysis-on-popular-dns-tunneling-tools\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/analysis-on-popular-dns-tunneling-tools\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-29.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-29.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/analysis-on-popular-dns-tunneling-tools\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"Analysis on Popular DNS Tunneling Tools"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/49789dcc5bf54ec919ed2c0c61b92f31","name":"Jianhong Xia","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/85dbc64b40c142e128319a362e09cea5a4ebacb66ed05fdabcf5edb49c362230?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/85dbc64b40c142e128319a362e09cea5a4ebacb66ed05fdabcf5edb49c362230?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/85dbc64b40c142e128319a362e09cea5a4ebacb66ed05fdabcf5edb49c362230?s=96&d=blank&r=g","caption":"Jianhong Xia"},"url":"https:\/\/www.infoblox.com\/blog\/author\/jianhong-xia\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3455","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/284"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=3455"}],"version-history":[{"count":4,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3455\/revisions"}],"predecessor-version":[{"id":11317,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3455\/revisions\/11317"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1797"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=3455"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=3455"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=3455"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}