Inter-Protocol exploration is an attack vector which encapsulates malicious data within a particular protocol in such a way that the resultant data stream is capable of exploiting a different application which uses a different protocol entirely.
This paper will expand upon previous research into Inter-Protocol Exploitation and will show the practicality of encapsulating exploit code in one protocol to compromise a program that uses a different protocol.