{"id":13758,"date":"2021-06-21T16:57:35","date_gmt":"2021-06-21T11:27:35","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=13758"},"modified":"2021-06-21T16:57:35","modified_gmt":"2021-06-21T11:27:35","slug":"tchopper","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/tchopper\/","title":{"rendered":"TChopper : Conduct Lateral Movement Attack By Leveraging Unfiltered Services Display Name To Smuggle Binaries As Chunks Into The Target Machine"},"content":{"rendered":"\n<p>TChopper, a new technique I have discovered recently and give it a nickname (Chop chop) to perform lateral movement using windows services display name and WMI by smuggling the malicious binary as base64 chunks and automate the process using the TChopper tool.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-4vfV1gNUyfg\/YM3efZiKUmI\/AAAAAAAAJkM\/WL04lvjbZpsBRBKrNysnZ8wEB-I4obWhACLcBGAsYHQ\/s676\/3.png\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>How It Works<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>the tool will get the file you willing to smuggle and encode the file as base64 into memory stream<\/li><li>divide the length of each line to fit 150-250 character length (250 is maximum allowed space for service lpDisplayname parameter&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/api\/winsvc\/nf-winsvc-createservicea\">https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/api\/winsvc\/nf-winsvc-createservicea<\/a>).<\/li><li>for chop chop attack it will create a unique service for each segmented chunk =&gt; start the service =&gt; then delete it to avoid duplicates or you can choose to only modify the service attack mode to be more faster and stable by choosing attack mode option (<strong>-m<\/strong>)<\/li><li>later on, it will modify service lpbinarypath parameter with required command line to grab service display name and pip out the results into tmp_payload.txt<\/li><li>finally, after finishing delivering all chuncks of the file as base64, the tool will create another service to decode the content into valid executbale and run it<\/li><\/ul>\n\n\n\n<p>while if you are conducting lateral movment using WMI technique you can also use Chopper to do that<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Tchopper will authenticate you session using WMI<\/li><li>creation of multiple process and use powershell unique command to pip out each segment to c:\\users\\public\\chop.enc<\/li><li>create final process to use certutil to decode the content into binary and execute it<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-8VU-uW1JEmU\/YM3flXowrcI\/AAAAAAAAJkc\/8aphsopYyVYX6m7RlJAzbWMLvSB1hZY-QCLcBGAsYHQ\/s797\/5.png\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Usage<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\">#<strong>chop chop mode<br>chopper.exe -s -u USERNAME -p PASSWORD -d DOMAIN -f BINARYLOCAL PATH<br>#chop chop done<br>chopper.exe -m -u USERNAME -p PASSWORD -d DOMAIN -f BINARYLOCAL PATH<br>#use WMI to smuggle<br>chopper.exe -w -u DOMAIN\\USERNAME -p PASSWORD -t MACHINE -f LOCALBINARYPATH<\/strong><\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/lawrenceamer\/TChopper\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>TChopper, a new technique I have discovered recently and give it a nickname (Chop chop) to perform lateral movement using windows services display name and WMI by smuggling the malicious binary as base64 chunks and automate the process using the TChopper tool. How It Works the tool will get the file you willing to smuggle [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16907,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-_s3RdYVkBco\/YM3fMaXua1I\/AAAAAAAAJkU\/k35Y0JRYZ5EFzk0lg9DHNuK7--kflFn2QCLcBGAsYHQ\/s658\/4.png","fifu_image_alt":"TChopper : Conduct Lateral Movement Attack By Leveraging Unfiltered Services Display Name To Smuggle Binaries As Chunks Into The Target Machine","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[1851,1875,3144,3309],"class_list":["post-13758","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-lateral-movement","tag-leveraging-unfiltered-services","tag-smuggle-binaries","tag-tchopper"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>TChopper : Conduct Lateral Movement Attack By Leverage<\/title>\n<meta name=\"description\" content=\"TChopper, a new technique I have discovered recently and give it a nickname (Chop chop) to perform lateral movement.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/tchopper\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TChopper : Conduct Lateral Movement Attack By Leverage\" \/>\n<meta property=\"og:description\" content=\"TChopper, a new technique I have discovered recently and give it a nickname (Chop chop) to perform lateral movement.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/tchopper\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-21T11:27:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-_s3RdYVkBco\/YM3fMaXua1I\/AAAAAAAAJkU\/k35Y0JRYZ5EFzk0lg9DHNuK7--kflFn2QCLcBGAsYHQ\/s658\/4.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-_s3RdYVkBco\/YM3fMaXua1I\/AAAAAAAAJkU\/k35Y0JRYZ5EFzk0lg9DHNuK7--kflFn2QCLcBGAsYHQ\/s658\/4.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/tchopper\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/tchopper\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"TChopper : Conduct Lateral Movement Attack By Leveraging Unfiltered Services Display Name To Smuggle Binaries As Chunks Into The Target Machine\",\"datePublished\":\"2021-06-21T11:27:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/tchopper\/\"},\"wordCount\":320,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/tchopper\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-_s3RdYVkBco\/YM3fMaXua1I\/AAAAAAAAJkU\/k35Y0JRYZ5EFzk0lg9DHNuK7--kflFn2QCLcBGAsYHQ\/s658\/4.png\",\"keywords\":[\"Lateral Movement\",\"Leveraging Unfiltered Services\",\"Smuggle Binaries\",\"TChopper\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/tchopper\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/tchopper\/\",\"name\":\"TChopper : Conduct Lateral Movement Attack By Leverage\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/tchopper\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/tchopper\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-_s3RdYVkBco\/YM3fMaXua1I\/AAAAAAAAJkU\/k35Y0JRYZ5EFzk0lg9DHNuK7--kflFn2QCLcBGAsYHQ\/s658\/4.png\",\"datePublished\":\"2021-06-21T11:27:35+00:00\",\"description\":\"TChopper, a new technique I have discovered recently and give it a nickname (Chop chop) to perform lateral movement.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/tchopper\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/tchopper\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-_s3RdYVkBco\/YM3fMaXua1I\/AAAAAAAAJkU\/k35Y0JRYZ5EFzk0lg9DHNuK7--kflFn2QCLcBGAsYHQ\/s658\/4.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-_s3RdYVkBco\/YM3fMaXua1I\/AAAAAAAAJkU\/k35Y0JRYZ5EFzk0lg9DHNuK7--kflFn2QCLcBGAsYHQ\/s658\/4.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TChopper : Conduct Lateral Movement Attack By Leverage","description":"TChopper, a new technique I have discovered recently and give it a nickname (Chop chop) to perform lateral movement.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/tchopper\/","og_locale":"en_US","og_type":"article","og_title":"TChopper : Conduct Lateral Movement Attack By Leverage","og_description":"TChopper, a new technique I have discovered recently and give it a nickname (Chop chop) to perform lateral movement.","og_url":"https:\/\/kalilinuxtutorials.com\/tchopper\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2021-06-21T11:27:35+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-_s3RdYVkBco\/YM3fMaXua1I\/AAAAAAAAJkU\/k35Y0JRYZ5EFzk0lg9DHNuK7--kflFn2QCLcBGAsYHQ\/s658\/4.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-_s3RdYVkBco\/YM3fMaXua1I\/AAAAAAAAJkU\/k35Y0JRYZ5EFzk0lg9DHNuK7--kflFn2QCLcBGAsYHQ\/s658\/4.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/tchopper\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/tchopper\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"TChopper : Conduct Lateral Movement Attack By Leveraging Unfiltered Services Display Name To Smuggle Binaries As Chunks Into The Target Machine","datePublished":"2021-06-21T11:27:35+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/tchopper\/"},"wordCount":320,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/tchopper\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-_s3RdYVkBco\/YM3fMaXua1I\/AAAAAAAAJkU\/k35Y0JRYZ5EFzk0lg9DHNuK7--kflFn2QCLcBGAsYHQ\/s658\/4.png","keywords":["Lateral Movement","Leveraging Unfiltered Services","Smuggle Binaries","TChopper"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/tchopper\/","url":"https:\/\/kalilinuxtutorials.com\/tchopper\/","name":"TChopper : Conduct Lateral Movement Attack By Leverage","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/tchopper\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/tchopper\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-_s3RdYVkBco\/YM3fMaXua1I\/AAAAAAAAJkU\/k35Y0JRYZ5EFzk0lg9DHNuK7--kflFn2QCLcBGAsYHQ\/s658\/4.png","datePublished":"2021-06-21T11:27:35+00:00","description":"TChopper, a new technique I have discovered recently and give it a nickname (Chop chop) to perform lateral movement.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/tchopper\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/tchopper\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-_s3RdYVkBco\/YM3fMaXua1I\/AAAAAAAAJkU\/k35Y0JRYZ5EFzk0lg9DHNuK7--kflFn2QCLcBGAsYHQ\/s658\/4.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-_s3RdYVkBco\/YM3fMaXua1I\/AAAAAAAAJkU\/k35Y0JRYZ5EFzk0lg9DHNuK7--kflFn2QCLcBGAsYHQ\/s658\/4.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-_s3RdYVkBco\/YM3fMaXua1I\/AAAAAAAAJkU\/k35Y0JRYZ5EFzk0lg9DHNuK7--kflFn2QCLcBGAsYHQ\/s658\/4.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":30826,"url":"https:\/\/kalilinuxtutorials.com\/latloader\/","url_meta":{"origin":13758,"position":0},"title":"LatLoader &#8211; Evading Elastic EDR In Lateral Movement","author":"Varshini","date":"October 13, 2023","format":false,"excerpt":"LatLoader is a PoC module to demonstrate automated lateral movement with the Havoc C2 framework. The main purpose of this project is to help others learn BOF and Havoc module development. This project can also help others understand basic EDR rule evasions, particularly when performing lateral movement. The\u00a0sideload\u00a0subcommand is the\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhmfAlWQ_O-lIPkLb335gVQYf8yrNUVmuNxcvJUl0XeIbUMDRcZGdgPUBD3INJEvIgDAFnt60oyoPxC8VZfakk2Phs0VIJwawHwQuCDSKQPIlneZyOTkEfjq4_z6qYMxmS4BQcF8pc-WWfOWGYqXO5BTkAVkRptZVeTM-HqLInLRwGZjWaEtg4hhnZpiw\/s16000\/LatLoader.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhmfAlWQ_O-lIPkLb335gVQYf8yrNUVmuNxcvJUl0XeIbUMDRcZGdgPUBD3INJEvIgDAFnt60oyoPxC8VZfakk2Phs0VIJwawHwQuCDSKQPIlneZyOTkEfjq4_z6qYMxmS4BQcF8pc-WWfOWGYqXO5BTkAVkRptZVeTM-HqLInLRwGZjWaEtg4hhnZpiw\/s16000\/LatLoader.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhmfAlWQ_O-lIPkLb335gVQYf8yrNUVmuNxcvJUl0XeIbUMDRcZGdgPUBD3INJEvIgDAFnt60oyoPxC8VZfakk2Phs0VIJwawHwQuCDSKQPIlneZyOTkEfjq4_z6qYMxmS4BQcF8pc-WWfOWGYqXO5BTkAVkRptZVeTM-HqLInLRwGZjWaEtg4hhnZpiw\/s16000\/LatLoader.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhmfAlWQ_O-lIPkLb335gVQYf8yrNUVmuNxcvJUl0XeIbUMDRcZGdgPUBD3INJEvIgDAFnt60oyoPxC8VZfakk2Phs0VIJwawHwQuCDSKQPIlneZyOTkEfjq4_z6qYMxmS4BQcF8pc-WWfOWGYqXO5BTkAVkRptZVeTM-HqLInLRwGZjWaEtg4hhnZpiw\/s16000\/LatLoader.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhmfAlWQ_O-lIPkLb335gVQYf8yrNUVmuNxcvJUl0XeIbUMDRcZGdgPUBD3INJEvIgDAFnt60oyoPxC8VZfakk2Phs0VIJwawHwQuCDSKQPIlneZyOTkEfjq4_z6qYMxmS4BQcF8pc-WWfOWGYqXO5BTkAVkRptZVeTM-HqLInLRwGZjWaEtg4hhnZpiw\/s16000\/LatLoader.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhmfAlWQ_O-lIPkLb335gVQYf8yrNUVmuNxcvJUl0XeIbUMDRcZGdgPUBD3INJEvIgDAFnt60oyoPxC8VZfakk2Phs0VIJwawHwQuCDSKQPIlneZyOTkEfjq4_z6qYMxmS4BQcF8pc-WWfOWGYqXO5BTkAVkRptZVeTM-HqLInLRwGZjWaEtg4hhnZpiw\/s16000\/LatLoader.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":12536,"url":"https:\/\/kalilinuxtutorials.com\/movekit\/","url_meta":{"origin":13758,"position":1},"title":"MoveKit : Cobalt Strike Kit For Lateral Movement","author":"R K","date":"April 23, 2021","format":false,"excerpt":"Movekit is an extension of built in Cobalt Strike lateral movement by leveraging the execute_assembly function with the SharpMove and SharpRDP .NET assemblies. The aggressor script handles payload creation by reading the template files for a specific execution type. IMPORTANT: To use the script a user will only need to\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":17476,"url":"https:\/\/kalilinuxtutorials.com\/http-request-smuggling\/","url_meta":{"origin":13758,"position":2},"title":"Http-Request-Smuggling : HTTP Request Smuggling Detection Tool","author":"R K","date":"August 18, 2021","format":false,"excerpt":"Http-Request-Smuggling is a high severity vulnerability which is a technique where an attacker smuggles an ambiguous HTTP request to bypass security controls and gain unauthorized access to performs malicious activities, the vulnerability was discovered back in 2005 by\u00a0watchfire\u00a0and later in August 2019 it re-discovered by\u00a0James Kettle - (albinowax)\u00a0and presented at\u00a0DEF\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/ANIRMVwyz5o\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":13397,"url":"https:\/\/kalilinuxtutorials.com\/cheesetools\/","url_meta":{"origin":13758,"position":3},"title":"CheeseTools : Self-developed Tools For Lateral Movement\/Code Execution","author":"R K","date":"June 16, 2021","format":false,"excerpt":"The CheeseTools has been made basing onto the already existing\u00a0MiscTool, so big shout-out to\u00a0rasta-mouse\u00a0for releasing them and for giving me the right motivation to work on them. CheeseExec Command Exec \/ Lateral movement via PsExec-like functionality. Must be running in the context of a privileged user. The tool is based\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":5432,"url":"https:\/\/kalilinuxtutorials.com\/dnslivery\/","url_meta":{"origin":13758,"position":4},"title":"DNSlivery : Easy Files &#038; Payloads Delivery Over DNS","author":"R K","date":"June 20, 2019","format":false,"excerpt":"DNSlivery allows to deliver files to a target using DNS as the transport protocol. Following are the features; allows to print, execute or save files to the targetdoes not require any client on the targetdoes not require a full-fledged DNS server What problem are you trying to solve? Easily deliver\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":31609,"url":"https:\/\/kalilinuxtutorials.com\/clzero\/","url_meta":{"origin":13758,"position":5},"title":"CLZero: Fuzzing HTTP\/1.1 CL.0 Request Smuggling Attack Vectors","author":"Varshini","date":"January 2, 2024","format":false,"excerpt":"CLZero is a strong program that helps security experts and penetration testers find and use attack vectors for HTTP\/1.1 CL.0 Request Smuggling. Request smuggling is a major security hole in web applications that can let hackers in and cause data to leak, among other bad things. CLZero was based on\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjfa6RZvY0EOQQMy3gtJvlTZ5IyP-HP0SxCBrrg15zYGCxxzAfKh0dsjKlbZ3WsJSFz9FBmVQBgww4i4INylLs47hP_tHx_wkwHjr-vmWqfADvL9XuTvpxcHeLuNkL_SJKV_KecOaCIgaSMXxZjw6v2IrxCqfWU8lOHR2wQc7B600zJMxPusjY47sRyOw\/s16000\/CLZero.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjfa6RZvY0EOQQMy3gtJvlTZ5IyP-HP0SxCBrrg15zYGCxxzAfKh0dsjKlbZ3WsJSFz9FBmVQBgww4i4INylLs47hP_tHx_wkwHjr-vmWqfADvL9XuTvpxcHeLuNkL_SJKV_KecOaCIgaSMXxZjw6v2IrxCqfWU8lOHR2wQc7B600zJMxPusjY47sRyOw\/s16000\/CLZero.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjfa6RZvY0EOQQMy3gtJvlTZ5IyP-HP0SxCBrrg15zYGCxxzAfKh0dsjKlbZ3WsJSFz9FBmVQBgww4i4INylLs47hP_tHx_wkwHjr-vmWqfADvL9XuTvpxcHeLuNkL_SJKV_KecOaCIgaSMXxZjw6v2IrxCqfWU8lOHR2wQc7B600zJMxPusjY47sRyOw\/s16000\/CLZero.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjfa6RZvY0EOQQMy3gtJvlTZ5IyP-HP0SxCBrrg15zYGCxxzAfKh0dsjKlbZ3WsJSFz9FBmVQBgww4i4INylLs47hP_tHx_wkwHjr-vmWqfADvL9XuTvpxcHeLuNkL_SJKV_KecOaCIgaSMXxZjw6v2IrxCqfWU8lOHR2wQc7B600zJMxPusjY47sRyOw\/s16000\/CLZero.webp?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/13758","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=13758"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/13758\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/16907"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=13758"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=13758"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=13758"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}