In which step Steganography fits in CEH System Hacking Cycle (SHC)

In which step Steganography fits in CEH System Hacking Cycle (SHC)

A.
Step 2: Crack the password
B.
Step 1: Enumerate users

C.
Step 3: Escalate privileges

D.
Step 4: Execute applications

E.
Step 5: Hide files

F.
Step 6: Cover your tracks

14 Comments on “In which step Steganography fits in CEH System Hacking Cycle (SHC)

  1. Chino says:

    Please fix it to show E “Hide Files” as the only answer. As bambam said, it clearly shows in his link and in my book that is E only.


Leave a Reply

Your email address will not be published. Required fields are marked *