Refer to "The art of cyberwarfare" book
Hiding malicious traffic in trusted protocols: DNS, etc.
Last updated 5 months ago