Which of the following steganography utilities exploits the nature of white space and allows the user to conceal information in these white spaces?
Why would you consider sending an email to an address that you know does not exist within the company you are performing a Penetration Test for?