Skip to main content

covert_and_data_exfiltration

Notice that with some tcl scripting hping can also be used for data exfiltration, for example we may send data inside TCP sequential ID numbers.

@@@ TO ADD @@@

IP ID Tracing for Zombie Identification Window Size Setting