In which step Steganography fits in CEH System Hacking Cycle (SHC)
Step 2: Crack the password
Step 1: Enumerate users
Step 3: Escalate privileges
Step 4: Execute applications
Step 5: Hide files
Step 6: Cover your tracks
Submit