In which step Steganography fits in CEH System Hacking Cycle (SHC)

In which step Steganography fits in CEH System Hacking Cycle (SHC)

In which step Steganography fits in CEH System Hacking Cycle (SHC)

A.
Step 2: Crack the password

B.
Step 1: Enumerate users

C.
Step 3: Escalate privileges

D.
Step 4: Execute applications

E.
Step 5: Hide files

F.
Step 6: Cover your tracks



Leave a Reply to miguel Cancel reply2

Your email address will not be published. Required fields are marked *

19 − 3 =


jojo

jojo

E; Goals in SHC are

Gaining Access
Escalating Privileges
Executing Application
Hiding Files
Covering Tracks

Steganography comes under “Hiding Files”