Return to Article Details BYPASSING DEFENSES THROUGH HUMAN MANIPULATION USING REVERSE TCP CONNECTIONS AND CUSTOM PAYLOADS Download Download PDF