--
You received this message because you are subscribed to the Google Groups "xCND" group.
To unsubscribe from this group and stop receiving emails from it, send an email to xcnd+uns...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
If it's a windows domain the DC would see it first. We have DNS trace logs going to ArcSight. All client dns requests are logged. https://technet.microsoft.com/en-us/library/dn800669.aspx
If there is malware using a reverse dns bindshell there may not be a domain request from the client. it would be using the 53 port as C2 and not dns, and most likely have the IP hardcoded so no lookup necessary. You would need a pcap to verify, assuming it's not encrypted or packed into unused frame space.
You can maybe look on the client side and grab a tool that can monitor which processes are bind to which port. If you see something using 53 that is not normal that may be an indicator. Also check the host file, windows will resolve from there first before asking a DC.
Scott Atta
------------------------------------
Sent from my Nexus 5x
It is a reputation based alert from SIEM. It alerted on the DNS server talking to the identified malware IP over port 53 based on a firewall event.
I am not too worried about the alert. For future investigations I want to be able to trace backwards. Which client made a request to my DNS that made the DNS talk to the malicious IP. I think it is a valid question that is really hard to determine without full pcap. I turned on all logging in my lab and I never once saw a log entry like this from the DNS server.
Queried nameserver.xxx.com what is the IP of jakelikesbiggirls.xxx.com
If it logged this, then I could go back and look at my query logs to see who requested jakelikesbiggirls.xxx.com and would find out that it was Joe's system who did the query.
I think we need a whiteboard and WebEX session.
Have a good President's day weekend. I'm leaving the frigid North for sunny California.
Yes all client queries are logged and sent the McAfee ESM. Haven't seen DNS server to Internet nameserver activity logged anywhere.
Time sync is too hard due to some many DNS requests. It's unreliable.