In which step Steganography fits in CEH System Hacking Cycle (SHC)

In which step Steganography fits in CEH System Hacking Cycle (SHC)

In which step Steganography fits in CEH System Hacking Cycle (SHC)

A.
Step 2: Crack the password

B.
Step 1: Enumerate users

C.
Step 3: Escalate privileges

D.
Step 4: Execute applications

E.
Step 5: Hide files

F.
Step 6: Cover your tracks



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Ghost Man

Ghost Man

E is the Ans.