Obfuscation

Refer to "The art of cyberwarfare" book

Hiding malicious traffic in trusted protocols: DNS, etc.

Last updated