An investigator is analyzing an attack in which malicious files were loaded on the network and were undetected. Several of the images received during the attack include repetitive patterns. Which anti-forensic technique was used?
Limited Time Offer
25%
Off
Daniel
2 days agoAlayna
13 days agoSang
30 days agoCandida
1 months agoGerald
1 months ago