How can we conceal files and potential threats inside other files in windows? In this lab, we step into the realm of steganography, the practice of concealing a file, message, image or video. 

End of lab Review

I found this lab less interesting than previous ones, but it nonetheless showed me that hidden executables were a greater risk in the past, as it is now mainly done through symbolic links that need to be run through the command line.

I stumbled significantly during the beginning of subtask three when I was asked to set up the symbolic link between the rtd and the setup of odysseus as the required files did not exist. I figured it had to be something left from an earlier exercise, so I went ahead and reinstalled the VM. It worked. 

Posted
AuthorMartin
CategoriesSEC602