First page Back Continue Last page Graphics
Network Steganography
Modify Existing Network Traffic
 
Create new traffic emulating legitimate traffic
 
Make use of otherwise unused or un-needed fields in network protocol headers
 
Modify protocol header values that are being used
 
Depending on data type, even the payload of the network traffic could be used