For more information on the topics discussed in this chapter, please visit the following links:
- https://7io.net/2015/09/30/data-exfiltration-dnsteal/
- https://n0where.net/data-exfiltration-over-dns-request-covert-channel-dnsexfiltrator
- https://github.com/m57/dnsteal
- https://blog.trendmicro.com/trendlabs-security-intelligence/data-exfiltration-in-targeted-attacks/
- https://www.techopedia.com/definition/14682/data-exfiltration
- https://www.sciencedirect.com/science/article/pii/S2212017313005033