Exploitation of data streams authorized by a network access control system for arbitrary data transfers: tunneling and covert channels over the HTTP protocol.
You can download it from the following link: https://packetstormsecurity.com/files/download/31251/covert_paper.txt
Source: https://packetstormsecurity.com/files/31251/covert_paper.txt.html

