A penetration tester is conducting an assessment and has gained initial access to a target system. To maintain access without alerting the network-based intrusion detection system (IDS), they decide to exfiltrate sensitive data. Which of the following techniques would effectively obfuscate the data being exfiltrated and is less likely to trigger an IDS alert?
Using steganography to embed the data within an image file
Compressing the data into a ZIP file with password protection before transmission
Encoding the data with Base64 before transmission
Encrypting the data using a symmetric encryption algorithm before transmission