network covert channels index

published: August 12, 2025

comprehensive technical reference for network covert channel techniques. this documentation is for educational and defensive security purposes.

technique catalog

techniquecategorybandwidthprimary tooldetection difficultystatus
dns null record tunnelingdns585 kbit/siodinemedium
dns txt record tunnelingdns10-50 kbit/sdnscat2low
dns timing channelsdns<1 bit/mincustomvery high
dns over https tunnelingdns100+ kbit/sdoh-proxyhigh
icmp tunnelingtraditionalkbps-mbpsptunnel-ngmedium
ntp extension field tunnelingtraditional300-500 bytes/packetcustomhigh
ntp timing channelstraditional<1 bit/minacademicvery high
dhcp option field tunnelingtraditional~192 bytes/exchangehide_dhcpvery high
http/https tunnelingweb60-80% tcpabpttsmedium
websocket tunnelingweb95-98% tcpwstunnelmedium-high
webrtc data channelsweb90-95% udprtctunnelhigh
quic connection id manipulationmodernnear tcpquicchigh
ipv6 extension headersmodern5+ bits/packetcustomhigh
mqtt tunnelingiotvariablemqtt_vpnmedium
lorawan covert channelsiot~38 bits/packetcloaklorahigh
coap protocol tunnelingiotvariablecceapmedium

github repositories

comprehensive toolkits

repositorydescriptiontechniques covered
cdpxe/networkcovertchannelsacademic toolkitmultiple network protocols
mindcrypt/covertchannels-steganographyresource collectioncomprehensive list

dns tunneling

repositorytechniqueperformance
yarrick/iodinenull records585 kbit/s
iagox86/dnscat2txt recordsencrypted c2
lukebaggett/dnscat2-powershelltxt recordswindows client

protocol tunneling

repositoryprotocoldescription
dhavalkapil/icmptunnelicmpvirtual tunnel interface
utoni/ptunnel-ngicmptcp over icmp
lacraig2/jhu_ntp_covert_channelntpextension field exploitation
rubenrdp/hide_dchpdhcpsname/file field tunneling

web tunneling

repositoryprotocolfeatures
nccgroup/abpttshttp/httpstcp tunneling
erebe/wstunnelwebsocketgigabit speeds
rtctunnel/rtctunnelwebrtcp2p tunneling
sensepost/regeorghttpsocks proxy

modern protocols

repositoryprotocoldescription
nuvious/quiccquicconnection id exploitation
ocram95/ipv6cc_softwarexipv6extension header channels
martin-ger/mqtt_vpnmqttip over mqtt

real-world usage

threat actors

  • apt29: dns tunneling for c2
  • apt32: txt record exfiltration
  • apt34: multiple dns techniques
  • 2014 home depot breach: 56m cards via dns

commercial frameworks

  • cobalt strike: malleable c2 profiles ($3,540+ annually)
  • metasploit: dns/http tunneling modules
  • empire: multiple tunnel options

academic research

key researchers

  • steffen wendzel: networkcovertchannels toolkit, pattern-based taxonomy
  • mordechai guri: 30+ air-gap techniques (beyond network scope)
  • nikolaos tsapakis: ntp covert channels (virus bulletin)

conferences

  • usenix security symposium
  • ieee symposium on security and privacy
  • acm conference on computer and communications security
  • virus bulletin conference

detection resources

datasets

  • cic-bell-dns-exf-2021: dns tunneling samples
  • malware traffic analysis: pcap collections
  • academic datasets: ieee/usenix repositories

detection accuracy

techniqueml detection ratemethod
dns tunneling99.38%lstm models
http tunneling85-95%pattern analysis
websocket80-90%connection analysis
icmp tunneling75-85%packet inspection

disclaimer

this documentation is for educational and defensive security purposes only. understanding these techniques is essential for:

  • security professionals implementing detection systems
  • researchers developing countermeasures
  • incident responders identifying compromise indicators
  • compliance teams assessing organizational risk

unauthorized implementation or use may violate laws and policies. always ensure proper authorization before testing.

on this page