Discover how one of the oldest tricks in the book is used to hide malicious payload where many cyber security experts may not think to look.
In this exercise, one of the most sensitive assets of your organization is leaked to the attacker. To complete this exercise, you will be required to think out of the box and slowly unravel the steps of the attacker, eventually uncovering the malicious payload.
Discover how one of the oldest tricks in the book is used to hide malicious payload where many cyber security experts may not think to look.
In this exercise, one of the most sensitive assets of your organization is leaked to the attacker. To complete this exercise, you will be required to think out of the box and slowly unravel the steps of the attacker, eventually uncovering the malicious payload.