image alt textGOVERNMENT OF INDIA
  • Skip to Main content
  • A- A A+
    • White to Black
    • Standard
  • social-share
    • Login
    • Register
Mygov logo Innovate logo
home-banner
  • Participate
09 Nov 2016 - 31 Jan 2017

Simulate Data leakage using ICMP and DNS protocols.

Most of the perimeter security implementations allow outbound DNS and ICMP traffic in their firewalls. ICMP and DNS protocols can be leveraged by the attackers to leak data from the organization. Implement a simulation software that can be used for data leakage using ICMP and DNS tunneling. The software is required for the evaluation of firewall intelligence.

Notes: In order to demonstrate the approach, simulate a setup in which only ICMP and DNS traffic is allowed over Internet

Sample Data Required: No

  • TransformingIndia
  • MyGov Blog
  • MyGov Quiz
  • Swachhbharat
  • Self4Society
  • Pledge
NIC Logo

MyGov platform is designed, developed and hosted by National Informatics Centre, Ministry of Electronics & Information Technology, Government of India.

Last Updated:November 29, 2016 at 3:16 pm - innov-194