White paper discussing methodologies for accessing internal networks using HTTP tunneling and tricking end users.
You can download it from the following link: https://packetstormsecurity.com/files/download/31558/intrusion-agent.pdf
Source: https://packetstormsecurity.com/files/31558/intrusion-agent.pdf.html

