8B: Use Steganography to Hide and Conceal Flashcards

3.7 Given a scenario, perform post-exploitation techniques. 5.3 Explain use cases of the following tools during the phases of a penetration test.

1
Q

An open-source tool used to conceal a payload in either an image or audio file.

A

Steghide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A Steg tool similar to other tools but written in Java which requires a JRE before using it.

A

OpenStego

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A CLI steganography tool that conceals a data payload within the whitespace of a text file that uses the ASCII format.

A

Snow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A tool used to synthesize an image into a .wav file

A

Coagula

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A tool for viewing and analysing the contents of music audio files

A

Sonic Visualizer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly