Challenge: Gobble Gobble Conceal & Deceive

Course Content
Blue Team Analyst POV: Steganography
> In this challenge, you will take on the Steganography challenge of identifying embedded data within an image. Malicious attackers use steganography for different attacks, such as macro-enabled Word documents, audio files, and pictures. This challenge aims to mimic a steganography attack by showcasing how effortlessly attackers can embed data within files. External tools are optional but not needed for this challenge.