When performing network forensics, all protocols should be analysed,
however, some tend to be more commonly abused than others; one of these
being DNS. While not as flexible as say HTTP, it does flow through, and
outside of networks a lot easier due ...