Free
Challenge: Don't Believe What You Hear
In this challenge, you will take on a Steganography challenge identifying embedded data within an audio file. Malicious attackers use Steganography for attacks such as macro-enabled Word documents, to conceal covert communication, and more. The goal is to show how attackers can effortlessly embed data within files to hide their activity.
![](https://cdn.prod.website-files.com/63eef15e3ff8fd318e9a6888/6422fa83dbda4c850389c7bb_Group%20170.webp)
1
H
30
M
Time
intermediate
difficulty
1
ceu/cpe
Course Content
The Art of Hidden Data
Investigate
Course Description
Blue Team Analyst POV: Steganography
>In this challenge, you will take on a Steganography challenge identifying embedded data within an audio file. Malicious attackers use Steganography for attacks such as macro-enabled Word documents, to conceal covert communication, and more. The goal is to show how attackers can effortlessly embed data within files to hide their activity.![CySeeker Peculiar](//images.ctfassets.net/kvf8rpi09wgk/qbEzmd4efRzpA1lBEW8vZ/9fb4bc97f855861107cfa48daf666920/CySeeker_Peculiar.png)