How can we conceal files and potential threats inside other files in windows? In this lab, we step into the realm of steganography, the practice of concealing a file, message, image or video.
End of lab Review
I found this lab less interesting than previous ones, but it nonetheless showed me that hidden executables were a greater risk in the past, as it is now mainly done through symbolic links that need to be run through the command line.
I stumbled significantly during the beginning of subtask three when I was asked to set up the symbolic link between the rtd and the setup of odysseus as the required files did not exist. I figured it had to be something left from an earlier exercise, so I went ahead and reinstalled the VM. It worked.