<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic DNS Tunneling in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dns-tunneling/m-p/309571#M741</link>
    <description>&lt;P&gt;Im trrying to detect dns tunneling with custom signatures.&lt;/P&gt;&lt;P&gt;i have some snort rules to begin.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;some of you have any strategies for this?&lt;/P&gt;</description>
    <pubDate>Wed, 05 Feb 2020 14:39:52 GMT</pubDate>
    <dc:creator>Torito</dc:creator>
    <dc:date>2020-02-05T14:39:52Z</dc:date>
    <item>
      <title>DNS Tunneling</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dns-tunneling/m-p/309571#M741</link>
      <description>&lt;P&gt;Im trrying to detect dns tunneling with custom signatures.&lt;/P&gt;&lt;P&gt;i have some snort rules to begin.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;some of you have any strategies for this?&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2020 14:39:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dns-tunneling/m-p/309571#M741</guid>
      <dc:creator>Torito</dc:creator>
      <dc:date>2020-02-05T14:39:52Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Tunneling</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dns-tunneling/m-p/309925#M752</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Why not just have a security policy to block it at the application layer?&lt;/P&gt;&lt;P&gt;Just a thought.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 22:51:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dns-tunneling/m-p/309925#M752</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2020-02-06T22:51:22Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Tunneling</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dns-tunneling/m-p/386595#M1077</link>
      <description>&lt;P&gt;Hi&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/132415"&gt;@Torito&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Heave you tried converting those signatures, if you want to use them, using the IPS Signature Converter Plugin for Panorama (&lt;A href="https://docs.paloaltonetworks.com/pan-os/u-v/custom-app-id-and-threat-signatures/ips-signature-converter-for-panorama.html)?" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/u-v/custom-app-id-and-threat-signatures/ips-signature-converter-for-panorama.html&lt;/A&gt;)? With what result?&lt;/P&gt;&lt;P&gt;Another approach would be to use DNS Security Service (&lt;A href="https://www.paloaltonetworks.com/products/threat-detection-and-prevention/dns-security" target="_blank"&gt;https://www.paloaltonetworks.com/products/threat-detection-and-prevention/dns-security&lt;/A&gt;).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Albert&lt;/P&gt;</description>
      <pubDate>Thu, 18 Feb 2021 13:41:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dns-tunneling/m-p/386595#M1077</guid>
      <dc:creator>CCACieszkowski</dc:creator>
      <dc:date>2021-02-18T13:41:09Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Tunneling</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dns-tunneling/m-p/386599#M1078</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Main reason would be that dns Application Signature does not detect all tunneling and&amp;nbsp;&lt;SPAN&gt;tcp-over-dns&amp;nbsp;Application Signature covers only a small subset of tools (" (...) application identifies traffic from the following tools, tcp-over-dns, dns2tcp, Iodine, Heyoka, OzymanDNS, and NSTX.").&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;dnscat2 goes through the firewall with ease.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Albert&lt;/P&gt;</description>
      <pubDate>Thu, 18 Feb 2021 13:47:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/dns-tunneling/m-p/386599#M1078</guid>
      <dc:creator>CCACieszkowski</dc:creator>
      <dc:date>2021-02-18T13:47:21Z</dc:date>
    </item>
  </channel>
</rss>

