A security researcher demonstrates a novel technique of storing and executing a game engine through DNS TXT records. By splitting a DOOM game engine into 2,000 base64-encoded DNS records, they create a functional program delivery system that bypasses traditional detection methods. This highlights how DNS infrastructure can be repurposed for arbitrary code storage and execution.
Background
DNS TXT records are designed to hold arbitrary text data, often used for email authentication, but lack validation on content. Researchers have previously explored using them for data exfiltration and payload delivery in cybersecurity contexts.
- Source
- Lobsters
- Published
- Mar 24, 2026 at 01:24 PM
- Score
- 6.0 / 10