‘Air-gapped’ networks are often considered the gold standard for isolating sensitive systems from external threats. However, these networks are not as invulnerable as many assume. Attackers have developed sophisticated techniques to bypass air gaps, leveraging weaknesses in DNS communication, external media, and even electromagnetic emissions.
This blog is based on findings from the Pentera Labs Research on bypassing air-gapped networks via DNS. We will explore:
DNS attacks are on the rise, with 88% of organizations reporting DNS-related threats in 2022 (IDC Global DNS Threat Report). Among these, DNS Tunneling has emerged as a major risk, enabling attackers to establish covert communication channels within otherwise isolated environments. In 2022 alone, DNS tunneling accounted for 28% of all DNS attacks, a 16% year-over-year increase.
DNS is particularly attractive to attackers due to its fundamental role in resolving domain names across both internet-connected and air-gapped environments.
Organizations that rely on DNS within their internal networks may unknowingly provide an entry point for sophisticated adversaries.
Furthermore, organizations implementing External Attack Surface Management can gain critical insights into exploitable weaknesses, ensuring that misconfigurations and overlooked entry points, such as DNS vulnerabilities, are proactively identified and mitigated.
Attackers exploit DNS in air-gapped networks by sending and receiving information through manipulated DNS queries.
Below are two common architectures of how DNS is connected to air-gapped networks:
In the second example, many organizations often make the mistake of thinking that by routing communication over an internal DNS server they are preventing a potential breach. However, they are still susceptible as the internal DNS server can still connect with a public DNS server.
Here’s how:
DNS is a protocol used to get a record of a specific name. While there are many types of records, two are of particular interest:
For example, we can see the AWS Name Servers hold the ‘pentera.io’ name.
It’s also important to remember that while DNS protocol can run on TCP, it is mostly based on UDP. Each protocol has a different use, but UDP does not have a built-in error-detecting mechanism, which will play a role later in this article.
For example, we can see the AWS Name Servers hold the ‘pentera.io’ name.
There are many other examples of how DNS has been abused as a C2 channel.
Despite its potential, communicating over DNS presents challenges:
Attackers circumvent these challenges using:
When communicating over DNS, attackers need to take a few things into account:
UDP transmits most network traffic, but it lacks a built-in error detection mechanism
Compatibility with the DNS protocol
Below are methods that can be used to overcome the challenges outlined in the previous section in communicating over DNS:
To evade detection, attackers employ Domain Generation Algorithms (DGA)
, which dynamically generate domain names based on predefined patterns. This technique allows attackers to:
from datetime import date
today = date.today()
domain1 = today.strftime(“%d%m%Y”) + “pentera.io”
domain2 = today.strftime(“%dpentera%m%Y”) + “pentera.io”
dprint(domain1, domain2)
This script generates predictable yet ever-changing domain names, making it difficult for defenders to blacklist attacker-controlled domains.
To evade detection, an attacker may generate domain names based on variables both sides know. While the executable is not necessarily difficult, an attacker or group would need the infrastructure to continue to buy root records as we will see in the example below.
In the below example, we will use a date – December 29, 2021 – as an example.
Attackers may configure their malware to generate a domain based on the date – at the 29/12/2021 to communicate with “29122021pentera.io” or with “29pentera122021.io” or with “2912pentera2021.io”.
Below is a simple code example of how to generate DNS based on date:
from datetime import date
today = date.today()
domain1 = today.strftime(“%d%m%Y”) + “pentera.io”
domain2 = today.strftime(“%dpentera%m%Y”) + “pentera.io”
domain3 = today.strftime(“%d%mpentera%Y”) + “pentera.io”
print(domain1, domain2, domain3)
The result is:
Because attackers can constantly send new requests over DNS using a new, known root domain, DGA over DNS will prove challenging to organizations using static methods or even with basic anomaly detection to detect and prevent.
To secure air-gapped networks against DNS abuse, organizations should implement the following strategies:
Air-gapped networks are not impervious to attacks. As demonstrated, DNS vulnerabilities provide a covert channel for data exfiltration, C2 communication, and network penetration. To strengthen defenses, organizations must remain vigilant by implementing robust DNS security measures, continuously validating their setup, and leveraging advanced monitoring techniques.
For a deeper dive into securing air-gapped networks and DNS attack prevention, check out the full Pentera Labs Research on bypassing air-gapped networks via DNS or contact our research team at Pentera.
Begin your journey in security validation and see why leading companies trust us with their cybersecurity validation.