iodine DNS Tunneling module. Establishes a DNS tunnel outbound to a server and domain name under your control.
There are many forms of remote access which may be used by different actors for various purposes. A red team may use remote access techniques that provide persistent access to an exploited target for the purposes of reconnaissance and lateral movement across the network. A systems administrator may use remote access to perform day to day operations on a network accessible computer. An array of techniques exist to obtain and maintain remote access across a network, including using a command and control server such as Cloud C². Common remote access techniques include reverse shells and may employ obfuscation techniques to mask the connection. See all remote access payloads.
This payload is for the LAN Turtle a Remote Access Toolkit posing as an ordinary USB Ethernet adapter. Drop it on a LAN for an instant backdoor shell. It's no wonder the LAN Turtle has been featured in Mr. Robot & National Geographic!