SNIcat: Circumventing the guardians
How the security features in state-of-the-art TLS inspection solutions can be exploited for covert data exfiltration
How the security features in state-of-the-art TLS inspection solutions can be exploited for covert data exfiltration