{"id":26123,"date":"2022-07-25T11:49:32","date_gmt":"2022-07-25T11:49:32","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=26123"},"modified":"2022-07-25T11:49:35","modified_gmt":"2022-07-25T11:49:35","slug":"pulsar-2","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/pulsar-2\/","title":{"rendered":"Pulsar : Data Exfiltration And Covert Communication Tool"},"content":{"rendered":"\n<p><strong>Pulsar<\/strong> is a tool for data exfiltration and covert communication that enable you to create a secure data transfer, a bizarre chat or a network tunnel through different protocols, for example you can receive data from tcp connection and resend it to real destination through DNS packets&nbsp;<\/p>\n\n\n\n<h2 class=\"has-light-green-cyan-background-color has-background wp-block-heading\">Setting up Pulsar<\/h2>\n\n\n\n<p>First, getting the code from repository and compile it with following command:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>$ cd pulsar<br>$ export GOPATH=$(shell pwd)<br>$ go get golang.org\/x\/net\/icmp<br>$ go build -o bin\/pulsar src\/main.go<\/strong><\/p>\n\n\n\n<p>or run:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>$ make<\/strong><\/p>\n\n\n\n<h2 class=\"has-light-green-cyan-background-color has-background wp-block-heading\">Connectors<\/h2>\n\n\n\n<p>A connector is a simple channel to the external world, with the connector you can read and write data from different sources.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Console:<ul><li>Default in\/out connector, read data from stdin and write to stdout<\/li><\/ul><\/li><li>TCP<ul><li>Read and write data through tcp connections<\/li><\/ul><\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>tcp:127.0.0.1:9000<\/strong><\/p>\n\n\n\n<p>UDP<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Read and write data through udp packet<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>udp:127.0.0.1:9000<\/strong><\/p>\n\n\n\n<p>ICMP<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Read and write data through icmp packet<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>icmp:127.0.0.1 (the connection port is obviously useless)<\/strong><\/p>\n\n\n\n<p>You can use option &#8211;in in order to select input connector and option &#8211;out to select output connector:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>&#8211;in tcp:127.0.0.1:9000<br>&#8211;out dns:fkdns.lol:2.3.4.5:8989<\/strong><\/p>\n\n\n\n<h2 class=\"has-light-green-cyan-background-color has-background wp-block-heading\">Handlers<\/h2>\n\n\n\n<p>A handler allows you to change data in transit, you can combine handlers arbitrarily.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Stub:<ul><li>Default, do nothing, pass through<\/li><\/ul><\/li><li>Base32<ul><li>Base32 encoder\/decoder<\/li><\/ul><\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>&#8211;handlers base32<\/strong><\/p>\n\n\n\n<p>You can use the &#8211;decode option to use&nbsp;<em>ALL<\/em>&nbsp;handlers in decoding mode<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>&#8211;handlers base64,base32,base64,cipher:key &#8211;decode<\/strong><\/p>\n\n\n\n<h1 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\">Example<\/h1>\n\n\n\n<p>In the following example Pulsar will be used to create a secure two-way tunnel on DNS protocol, data will be read from TCP connection (simple nc client) and resend encrypted through the tunnel.<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>[nc 127.0.0.1 9000] &lt;&#8211;TCP&#8211;&gt; [pulsar] &lt;&#8211;DNS&#8211;&gt; [pulsar] &lt;&#8211;TCP&#8211;&gt; [nc -l 127.0.0.1 -p 9900]<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>$ .\/pulsar &#8211;in tcp:127.0.0.1:9000 &#8211;out dns:test.org@192.168.1.199:8989 &#8211;duplex &#8211;plain in &#8211;handlers &#8216;cipher:supersekretkey!!&#8217;<br>$ nc 127.0.0.1 9000<\/strong><\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/jacopodl\/Pulsar\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Pulsar is a tool for data exfiltration and covert communication that enable you to create a secure data transfer, a bizarre chat or a network tunnel through different protocols, for example you can receive data from tcp connection and resend it to real destination through DNS packets&nbsp; Setting up Pulsar First, getting the code from [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":26133,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhaLbljyIlkfDxiAXq6AKvBhNO0DwIMr7IClCQz7okOo07KC4ccOMf3S9JnGykXzYor9H3uF_L9t10I6Cs4uyd8mMMAGJLlUCYDQjk9ZserBJk2J7KV41JVY0xu-sPBdpixvdE4L1tw8Rts1tDToxSR_TOdlcS6Y4vvqi-tCSChQPdB-RC6do_odf4t\/s728\/Data%20Exfiltration%20(2).png","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[5470,757,2647],"class_list":["post-26123","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-covert-communication","tag-data-exfiltration","tag-pulsar"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Pulsar : Data Exfiltration And Covert Communication Tool<\/title>\n<meta name=\"description\" content=\"Pulsar is a tool for data exfiltration and covert communication that enable you to create a secure data transfer, a bizarre chat.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/pulsar-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pulsar : Data Exfiltration And Covert Communication Tool\" \/>\n<meta property=\"og:description\" content=\"Pulsar is a tool for data exfiltration and covert communication that enable you to create a secure data transfer, a bizarre chat.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/pulsar-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-25T11:49:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-25T11:49:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhaLbljyIlkfDxiAXq6AKvBhNO0DwIMr7IClCQz7okOo07KC4ccOMf3S9JnGykXzYor9H3uF_L9t10I6Cs4uyd8mMMAGJLlUCYDQjk9ZserBJk2J7KV41JVY0xu-sPBdpixvdE4L1tw8Rts1tDToxSR_TOdlcS6Y4vvqi-tCSChQPdB-RC6do_odf4t\/s728\/Data%20Exfiltration%20(2).png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhaLbljyIlkfDxiAXq6AKvBhNO0DwIMr7IClCQz7okOo07KC4ccOMf3S9JnGykXzYor9H3uF_L9t10I6Cs4uyd8mMMAGJLlUCYDQjk9ZserBJk2J7KV41JVY0xu-sPBdpixvdE4L1tw8Rts1tDToxSR_TOdlcS6Y4vvqi-tCSChQPdB-RC6do_odf4t\/s728\/Data%20Exfiltration%20(2).png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/pulsar-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pulsar-2\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Pulsar : Data Exfiltration And Covert Communication Tool\",\"datePublished\":\"2022-07-25T11:49:32+00:00\",\"dateModified\":\"2022-07-25T11:49:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pulsar-2\/\"},\"wordCount\":300,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pulsar-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhaLbljyIlkfDxiAXq6AKvBhNO0DwIMr7IClCQz7okOo07KC4ccOMf3S9JnGykXzYor9H3uF_L9t10I6Cs4uyd8mMMAGJLlUCYDQjk9ZserBJk2J7KV41JVY0xu-sPBdpixvdE4L1tw8Rts1tDToxSR_TOdlcS6Y4vvqi-tCSChQPdB-RC6do_odf4t\/s728\/Data%20Exfiltration%20(2).png\",\"keywords\":[\"Covert Communication\",\"Data Exfiltration\",\"Pulsar\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/pulsar-2\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/pulsar-2\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/pulsar-2\/\",\"name\":\"Pulsar : Data Exfiltration And Covert Communication Tool\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pulsar-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pulsar-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhaLbljyIlkfDxiAXq6AKvBhNO0DwIMr7IClCQz7okOo07KC4ccOMf3S9JnGykXzYor9H3uF_L9t10I6Cs4uyd8mMMAGJLlUCYDQjk9ZserBJk2J7KV41JVY0xu-sPBdpixvdE4L1tw8Rts1tDToxSR_TOdlcS6Y4vvqi-tCSChQPdB-RC6do_odf4t\/s728\/Data%20Exfiltration%20(2).png\",\"datePublished\":\"2022-07-25T11:49:32+00:00\",\"dateModified\":\"2022-07-25T11:49:35+00:00\",\"description\":\"Pulsar is a tool for data exfiltration and covert communication that enable you to create a secure data transfer, a bizarre chat.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/pulsar-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/pulsar-2\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhaLbljyIlkfDxiAXq6AKvBhNO0DwIMr7IClCQz7okOo07KC4ccOMf3S9JnGykXzYor9H3uF_L9t10I6Cs4uyd8mMMAGJLlUCYDQjk9ZserBJk2J7KV41JVY0xu-sPBdpixvdE4L1tw8Rts1tDToxSR_TOdlcS6Y4vvqi-tCSChQPdB-RC6do_odf4t\/s728\/Data%20Exfiltration%20(2).png\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhaLbljyIlkfDxiAXq6AKvBhNO0DwIMr7IClCQz7okOo07KC4ccOMf3S9JnGykXzYor9H3uF_L9t10I6Cs4uyd8mMMAGJLlUCYDQjk9ZserBJk2J7KV41JVY0xu-sPBdpixvdE4L1tw8Rts1tDToxSR_TOdlcS6Y4vvqi-tCSChQPdB-RC6do_odf4t\/s728\/Data%20Exfiltration%20(2).png\",\"width\":\"728\",\"height\":\"411\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pulsar : Data Exfiltration And Covert Communication Tool","description":"Pulsar is a tool for data exfiltration and covert communication that enable you to create a secure data transfer, a bizarre chat.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/pulsar-2\/","og_locale":"en_US","og_type":"article","og_title":"Pulsar : Data Exfiltration And Covert Communication Tool","og_description":"Pulsar is a tool for data exfiltration and covert communication that enable you to create a secure data transfer, a bizarre chat.","og_url":"https:\/\/kalilinuxtutorials.com\/pulsar-2\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2022-07-25T11:49:32+00:00","article_modified_time":"2022-07-25T11:49:35+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhaLbljyIlkfDxiAXq6AKvBhNO0DwIMr7IClCQz7okOo07KC4ccOMf3S9JnGykXzYor9H3uF_L9t10I6Cs4uyd8mMMAGJLlUCYDQjk9ZserBJk2J7KV41JVY0xu-sPBdpixvdE4L1tw8Rts1tDToxSR_TOdlcS6Y4vvqi-tCSChQPdB-RC6do_odf4t\/s728\/Data%20Exfiltration%20(2).png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhaLbljyIlkfDxiAXq6AKvBhNO0DwIMr7IClCQz7okOo07KC4ccOMf3S9JnGykXzYor9H3uF_L9t10I6Cs4uyd8mMMAGJLlUCYDQjk9ZserBJk2J7KV41JVY0xu-sPBdpixvdE4L1tw8Rts1tDToxSR_TOdlcS6Y4vvqi-tCSChQPdB-RC6do_odf4t\/s728\/Data%20Exfiltration%20(2).png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/pulsar-2\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/pulsar-2\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Pulsar : Data Exfiltration And Covert Communication Tool","datePublished":"2022-07-25T11:49:32+00:00","dateModified":"2022-07-25T11:49:35+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/pulsar-2\/"},"wordCount":300,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/pulsar-2\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhaLbljyIlkfDxiAXq6AKvBhNO0DwIMr7IClCQz7okOo07KC4ccOMf3S9JnGykXzYor9H3uF_L9t10I6Cs4uyd8mMMAGJLlUCYDQjk9ZserBJk2J7KV41JVY0xu-sPBdpixvdE4L1tw8Rts1tDToxSR_TOdlcS6Y4vvqi-tCSChQPdB-RC6do_odf4t\/s728\/Data%20Exfiltration%20(2).png","keywords":["Covert Communication","Data Exfiltration","Pulsar"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/pulsar-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/pulsar-2\/","url":"https:\/\/kalilinuxtutorials.com\/pulsar-2\/","name":"Pulsar : Data Exfiltration And Covert Communication Tool","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/pulsar-2\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/pulsar-2\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhaLbljyIlkfDxiAXq6AKvBhNO0DwIMr7IClCQz7okOo07KC4ccOMf3S9JnGykXzYor9H3uF_L9t10I6Cs4uyd8mMMAGJLlUCYDQjk9ZserBJk2J7KV41JVY0xu-sPBdpixvdE4L1tw8Rts1tDToxSR_TOdlcS6Y4vvqi-tCSChQPdB-RC6do_odf4t\/s728\/Data%20Exfiltration%20(2).png","datePublished":"2022-07-25T11:49:32+00:00","dateModified":"2022-07-25T11:49:35+00:00","description":"Pulsar is a tool for data exfiltration and covert communication that enable you to create a secure data transfer, a bizarre chat.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/pulsar-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/pulsar-2\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhaLbljyIlkfDxiAXq6AKvBhNO0DwIMr7IClCQz7okOo07KC4ccOMf3S9JnGykXzYor9H3uF_L9t10I6Cs4uyd8mMMAGJLlUCYDQjk9ZserBJk2J7KV41JVY0xu-sPBdpixvdE4L1tw8Rts1tDToxSR_TOdlcS6Y4vvqi-tCSChQPdB-RC6do_odf4t\/s728\/Data%20Exfiltration%20(2).png","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhaLbljyIlkfDxiAXq6AKvBhNO0DwIMr7IClCQz7okOo07KC4ccOMf3S9JnGykXzYor9H3uF_L9t10I6Cs4uyd8mMMAGJLlUCYDQjk9ZserBJk2J7KV41JVY0xu-sPBdpixvdE4L1tw8Rts1tDToxSR_TOdlcS6Y4vvqi-tCSChQPdB-RC6do_odf4t\/s728\/Data%20Exfiltration%20(2).png","width":"728","height":"411"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhaLbljyIlkfDxiAXq6AKvBhNO0DwIMr7IClCQz7okOo07KC4ccOMf3S9JnGykXzYor9H3uF_L9t10I6Cs4uyd8mMMAGJLlUCYDQjk9ZserBJk2J7KV41JVY0xu-sPBdpixvdE4L1tw8Rts1tDToxSR_TOdlcS6Y4vvqi-tCSChQPdB-RC6do_odf4t\/s728\/Data%20Exfiltration%20(2).png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":10130,"url":"https:\/\/kalilinuxtutorials.com\/pulsar\/","url_meta":{"origin":26123,"position":0},"title":"Pulsar : Network Footprint Scanner Platform","author":"R K","date":"April 5, 2020","format":false,"excerpt":"Pulsar is an automated network footprint scanner for Red Teams, Pentesters and Bounty Hunters. Its focused on discovery of organization public facing assets with minimal knowledge about its infrastructure. Along with network data visualization, it attempts to give a basic vulnerability score to find infrastructure weak points and their relation\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":11394,"url":"https:\/\/kalilinuxtutorials.com\/snicat\/","url_meta":{"origin":26123,"position":1},"title":"SNIcat : Server Name Indication Concatenator","author":"R K","date":"September 8, 2020","format":false,"excerpt":"SNIcat is a proof of concept tool that performs data exfiltration, utilizing a covert channel method via. Server Name Indication, a TLS Client Hello Extension. The tool consists of an agent which resides on the compromised internal host, and a Command&Control Server which controls the agent and gathers exfiltrated data.\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":36587,"url":"https:\/\/kalilinuxtutorials.com\/modern-network-fingerprinting\/","url_meta":{"origin":26123,"position":2},"title":"Modern Network Fingerprinting : HASSH And JA4+SSH Tools","author":"Varshini","date":"February 20, 2025","format":false,"excerpt":"Network fingerprinting is a critical technique for identifying and analyzing network traffic patterns, particularly in encrypted protocols. Two modern tools, HASSH and JA4+SSH, have emerged as powerful solutions for fingerprinting Secure Shell (SSH) traffic, enabling enhanced security, anomaly detection, and forensic analysis. HASSH: An Overview HASSH, developed by Ben Reardon\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Modern-Network-Fingerprinting.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Modern-Network-Fingerprinting.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Modern-Network-Fingerprinting.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Modern-Network-Fingerprinting.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Modern-Network-Fingerprinting.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Modern-Network-Fingerprinting.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":28091,"url":"https:\/\/kalilinuxtutorials.com\/netllix\/","url_meta":{"origin":26123,"position":3},"title":"NetLlix : Tool To Emulate &amp; Test Exfiltration Of Data Over Different Network Protocols","author":"R K","date":"December 26, 2022","format":false,"excerpt":"NetLlix is a project created with an aim to emulate and test exfiltration of data over different network protocols. The emulation is performed w\/o the usage of native API's. This will help blue teams write correlation rules to detect any type of C2 communication or data exfiltration. Currently, this project\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjCxmC_TNufAsVEruINrKaaltRHxS3VBXY9V0PVrEmcc3nnCDx0KM7QUU8hpMgVbdkFtrjtlhUIUqnJVhpOePYHNBgpmsX3_KYlT2SPUXdJmk_-rKp7MEQ_qQOB86JDpKILKWvePe3LCEb7JZQKMgS3OrLrcN4CnfQJ33NBCbyC0jrXYswtHPImc3Z8\/s728\/NetLlix%281%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjCxmC_TNufAsVEruINrKaaltRHxS3VBXY9V0PVrEmcc3nnCDx0KM7QUU8hpMgVbdkFtrjtlhUIUqnJVhpOePYHNBgpmsX3_KYlT2SPUXdJmk_-rKp7MEQ_qQOB86JDpKILKWvePe3LCEb7JZQKMgS3OrLrcN4CnfQJ33NBCbyC0jrXYswtHPImc3Z8\/s728\/NetLlix%281%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjCxmC_TNufAsVEruINrKaaltRHxS3VBXY9V0PVrEmcc3nnCDx0KM7QUU8hpMgVbdkFtrjtlhUIUqnJVhpOePYHNBgpmsX3_KYlT2SPUXdJmk_-rKp7MEQ_qQOB86JDpKILKWvePe3LCEb7JZQKMgS3OrLrcN4CnfQJ33NBCbyC0jrXYswtHPImc3Z8\/s728\/NetLlix%281%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjCxmC_TNufAsVEruINrKaaltRHxS3VBXY9V0PVrEmcc3nnCDx0KM7QUU8hpMgVbdkFtrjtlhUIUqnJVhpOePYHNBgpmsX3_KYlT2SPUXdJmk_-rKp7MEQ_qQOB86JDpKILKWvePe3LCEb7JZQKMgS3OrLrcN4CnfQJ33NBCbyC0jrXYswtHPImc3Z8\/s728\/NetLlix%281%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":35699,"url":"https:\/\/kalilinuxtutorials.com\/vermilion\/","url_meta":{"origin":26123,"position":4},"title":"Vermilion : Mastering Linux Post-Exploitation For Red Team Success","author":"Varshini","date":"January 17, 2025","format":false,"excerpt":"Vermilion is a simple and lightweight CLI tool designed for rapid collection, and optional exfiltration of sensitive information from Linux systems.Its primary purpose is to streamline the process of gathering critical data in red teaming scenarios. How It Works Vermilion is a Linux-focused tool designed for efficient information gathering and\u2026","rel":"","context":"In &quot;Post Exploitation&quot;","block_context":{"text":"Post Exploitation","link":"https:\/\/kalilinuxtutorials.com\/category\/pe\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Vermilion-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Vermilion-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Vermilion-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Vermilion-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Vermilion-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Vermilion-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":34603,"url":"https:\/\/kalilinuxtutorials.com\/veiltransfer\/","url_meta":{"origin":26123,"position":5},"title":"VeilTransfer &#8211; Mastering Data Exfiltration Simulation For Enhanced Cybersecurity","author":"Varshini","date":"August 27, 2024","format":false,"excerpt":"VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data exfiltration techniques used by advanced threat actors, allowing organizations to evaluate and improve their security posture. By leveraging multiple exfiltration methods such as MEGA, Github, SFTP, WebDAV, and more, VeilTransfer helps\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjdcnXfsO54mtdqlnoGH7oiKrkioqCgj_NVGb54PSMiDn4FlkSyTk6XTe6aKM_o1_0-VwwkH4LDYLS6CwFqnPNaDCdWIb4UYeJpQUC8FQo1xvZ3XzPt4xucThZMSIsU6Ss3vzmna4ZzX_qyWcG8LQZjHJ4_YYbqhpTzXdIFqcb8M-cw3BL36yitMR6VT8fE\/s16000\/VeilTransfer%20%281%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjdcnXfsO54mtdqlnoGH7oiKrkioqCgj_NVGb54PSMiDn4FlkSyTk6XTe6aKM_o1_0-VwwkH4LDYLS6CwFqnPNaDCdWIb4UYeJpQUC8FQo1xvZ3XzPt4xucThZMSIsU6Ss3vzmna4ZzX_qyWcG8LQZjHJ4_YYbqhpTzXdIFqcb8M-cw3BL36yitMR6VT8fE\/s16000\/VeilTransfer%20%281%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjdcnXfsO54mtdqlnoGH7oiKrkioqCgj_NVGb54PSMiDn4FlkSyTk6XTe6aKM_o1_0-VwwkH4LDYLS6CwFqnPNaDCdWIb4UYeJpQUC8FQo1xvZ3XzPt4xucThZMSIsU6Ss3vzmna4ZzX_qyWcG8LQZjHJ4_YYbqhpTzXdIFqcb8M-cw3BL36yitMR6VT8fE\/s16000\/VeilTransfer%20%281%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjdcnXfsO54mtdqlnoGH7oiKrkioqCgj_NVGb54PSMiDn4FlkSyTk6XTe6aKM_o1_0-VwwkH4LDYLS6CwFqnPNaDCdWIb4UYeJpQUC8FQo1xvZ3XzPt4xucThZMSIsU6Ss3vzmna4ZzX_qyWcG8LQZjHJ4_YYbqhpTzXdIFqcb8M-cw3BL36yitMR6VT8fE\/s16000\/VeilTransfer%20%281%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjdcnXfsO54mtdqlnoGH7oiKrkioqCgj_NVGb54PSMiDn4FlkSyTk6XTe6aKM_o1_0-VwwkH4LDYLS6CwFqnPNaDCdWIb4UYeJpQUC8FQo1xvZ3XzPt4xucThZMSIsU6Ss3vzmna4ZzX_qyWcG8LQZjHJ4_YYbqhpTzXdIFqcb8M-cw3BL36yitMR6VT8fE\/s16000\/VeilTransfer%20%281%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjdcnXfsO54mtdqlnoGH7oiKrkioqCgj_NVGb54PSMiDn4FlkSyTk6XTe6aKM_o1_0-VwwkH4LDYLS6CwFqnPNaDCdWIb4UYeJpQUC8FQo1xvZ3XzPt4xucThZMSIsU6Ss3vzmna4ZzX_qyWcG8LQZjHJ4_YYbqhpTzXdIFqcb8M-cw3BL36yitMR6VT8fE\/s16000\/VeilTransfer%20%281%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/26123","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=26123"}],"version-history":[{"count":9,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/26123\/revisions"}],"predecessor-version":[{"id":26350,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/26123\/revisions\/26350"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/26133"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=26123"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=26123"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=26123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}