Ethical Hacking (part 11.0/20): Introduction to steganography with examples and tools

Maciej Zalwert
5 min readMar 5, 2022

How to hide secret messages inside digital objects

Note: by sharing knowledge of existing vulnerabilities, tools and countermeasures, we can prevent cyber criminals from taking inappropriate actions.

This article will cover:

  1. Introduction to steganography
Maciej Zalwert

Data Scientist with 5+ years of broad-based experience in building data-intensive solutions for diverse industries