8B: Use Steganography to Hide and Conceal Flashcards
3.7 Given a scenario, perform post-exploitation techniques. 5.3 Explain use cases of the following tools during the phases of a penetration test.
1
Q
An open-source tool used to conceal a payload in either an image or audio file.
A
Steghide
2
Q
A Steg tool similar to other tools but written in Java which requires a JRE before using it.
A
OpenStego
3
Q
A CLI steganography tool that conceals a data payload within the whitespace of a text file that uses the ASCII format.
A
Snow
4
Q
A tool used to synthesize an image into a .wav file
A
Coagula
5
Q
A tool for viewing and analysing the contents of music audio files
A
Sonic Visualizer