In which step Steganography fits in CEH System Hacking Cycle (SHC)
A.
Step 2: Crack the password
B.
Step 1: Enumerate users
C.
Step 3: Escalate privileges
D.
Step 4: Execute applications
E.
Step 5: Hide files
F.
Step 6: Cover your tracks
In which step Steganography fits in CEH System Hacking Cycle (SHC)
In which step Steganography fits in CEH System Hacking Cycle (SHC)
A.
Step 2: Crack the password
B.
Step 1: Enumerate users
C.
Step 3: Escalate privileges
D.
Step 4: Execute applications
E.
Step 5: Hide files
F.
Step 6: Cover your tracks
E
E; Goals in SHC are
Gaining Access
Escalating Privileges
Executing Application
Hiding Files
Covering Tracks
Steganography comes under “Hiding Files”