Refer to "The art of cyberwarfare" book
Hiding malicious traffic in trusted protocols: DNS, etc.
Last updated 9 months ago