For more information on the topics discussed in this chapter, please visit the following links:
- https://holdmybeersecurity.com/2017/10/15/part-3-how-to-red-team-setting-up-environment/
- https://speakerdeck.com/bluscreenofjeff/building-a-better-moat-designing-an-effective-covert-red-team-attack-infrastructure?slide=10
- https://arno0x0x.wordpress.com/2017/09/07/using-webdav-features-as-a-covert-channel/
- https://securityonline.info/sg1-swiss-army-knife/
- https://n0where.net/data-exfiltration-over-dns-request-covert-channel-dnsexfiltrator