Free
Challenge: Saving a Fellow Monster
In this challenge, you will take on a Steganography challenge identifying embedded data within an image. Malicious attackers use Steganography for attacks such as macro-enabled Word documents, to conceal covert communication, and more. The goal is to show how attackers can effortlessly embed data within files to hide their activity.

1
H
45
M
Time
intermediate
difficulty
2
ceu/cpe
Course Content
No items found.
Course Description
Blue Team Analyst POV: Steganography
>In this challenge, you will take on the Steganography challenge of identifying embedded data within an image. Malicious attackers use steganography for different attacks, such as macro-enabled Word documents, audio files, and pictures. This challenge aims to mimic a steganography attack by showcasing how effortlessly attackers can embed data within files. External tools are not needed for this challenge.