Which method is commonly used to bypass eccouncil video

 ·  PT1H46M27S  ·  EN

ethical-hacker video for which method is commonly used to bypass firewalls by encapsulating malicious traffic inside allowed protocols, such as HTTP or DNS?

Full Certification Question

Which method is commonly used to bypass firewalls by encapsulating malicious traffic inside allowed protocols, such as HTTP or DNS?