In which step Steganography fits in CEH System Hacking Cycle (SHC)

In which step Steganography fits in CEH System Hacking Cycle (SHC)

In which step Steganography fits in CEH System Hacking Cycle (SHC)

A.
Step 2: Crack the password

B.
Step 1: Enumerate users

C.
Step 3: Escalate privileges

D.
Step 4: Execute applications

E.
Step 5: Hide files

F.
Step 6: Cover your tracks



Leave a Reply 2

Your email address will not be published. Required fields are marked *


jojo

jojo

E; Goals in SHC are

Gaining Access
Escalating Privileges
Executing Application
Hiding Files
Covering Tracks

Steganography comes under “Hiding Files”