Challenge: Gobble Gobble Conceal & Deceive
In this week's challenge, you will take on a Steganography challenge identifying embedded data within an image. Malicious attackers use Steganography for attacks such as macro-enabled Word documents, to conceal covert communication, and more. The goal is to show how attackers can effortlessly embed data within files to hide their activity.
Already have an account? Sign In »

Module 1: Investigate
Blue Team Analyst POV: Steganography
In this weekly challenge, you will take on the Steganography challenge of identifying embedded data within an image. Malicious attackers use steganography for different attacks, such as macro-enabled Word documents, audio files, and pictures. This challenge aims to mimic a steganography attack by showcasing how effortlessly attackers can embed data within files. External tools are optional but not needed for this challenge.
Who is this for:
Early career to mid practitioners. This challenge may be difficult for individuals new to cybersecurity, but the difficulty rating on this challenge is relatively low. We encourage using any internet resources and community/colleague assistance in completing the challenge.
Are write-ups permitted?
Yes, write-ups are permitted; please do not post answers directly. All write-ups should include a link to Cybrary and the Cybrary Course.
What resources are available to help solve this challenge?:
Online search, community, colleagues, or fellow practitioners.

Marc Balingit
Security Researcher - Incident Response


Complete this entire course to earn a Challenge: Gobble Gobble Conceal & Deceive Certificate of Completion