dns.exe and its quirks
2024-12-15 00:21:35 Author: www.hexacorn.com(查看原文) 阅读量:6 收藏

This is not a proper research yet. I just happened to stumble upon an interesting artifact which is a file:

C:\Windows\System32\dns\RFC5011.csv

that dns.exe service process tries to read.

This csv file appears to be related to DNSSEC, but I don’t know enough about it, plus have not spent enough time analyzing the actual dns.exe binary to determine the csv file’s purpose and layout yet.

BUT

The code reading this CSV file refers to TrustAnchor and TrustPoint strings so it’s possible the program is using the content of the file to import a set of trusted public keys utilized by DNSSEC. Which of course could be abused.

After poking around a bit more, I have created a list of file system-based artifacts that the DNS-related executables and libraries (c:\Windows\System32\dns.exe, c:\Windows\System32\dnscmd.exe, c:\Windows\System32\dnsmgr.dll) touch:

  • C:\Windows\System32\dns\backup\boot
  • C:\Windows\System32\dns\backup\boot.first
  • C:\Windows\System32\dns\backup\dns.log
  • C:\Windows\System32\dns\boot
  • C:\Windows\System32\dns\boot.txt
  • C:\Windows\System32\dns\boot.write.error
  • C:\Windows\System32\dns\dns.log
  • C:\Windows\System32\dns\RFC5011.csv
  • C:\Windows\System32\dns\TrustAnchors.dns

This is really not very useful yet, but it is a good starting point to dig deeper.


文章来源: https://www.hexacorn.com/blog/2024/12/15/dns-exe-and-its-quirks/
如有侵权请联系:admin#unsafe.sh