How would an attacker hide an executable from being viewed by Windows Explorer?
How would an attacker hide an executable from being viewed by Windows Explorer?
An attacker can hide an executable from being viewed by Windows Explorer by placing it into an Alternate Data Stream (ADS) of a text file. ADS is a feature of NTFS file systems in Windows that allows more than one data stream to be associated with a filename, providing an effective way to hide data without it being easily detected through standard file browsing techniques.
Answer should be "D"