fig3_attack-chain-of-powload-with-steganography