First page Back Continue Last page Graphics
Network Steganography
Modify Existing Network Traffic
Create new traffic emulating legitimate traffic
Make use of otherwise unused or un-needed fields in network protocol headers
Modify protocol header values that are being used
Depending on data type, even the payload of the network traffic could be used