Hide Information in JPEG Files

  Рет қаралды 183,332

NeuralNine

NeuralNine

Күн бұрын

Пікірлер: 327
@uday-xyz1523
@uday-xyz1523 3 жыл бұрын
imagine people storing credit card info in photos, this is like 'safe behind a painting' but virtual
@user-sz7rp7kr4c
@user-sz7rp7kr4c 3 жыл бұрын
People do it but if the police knew about it, you have a Problem 😂
@TheOfficialKingIdea
@TheOfficialKingIdea 3 жыл бұрын
Yeah, imagine…
@sergsergesrgergseg
@sergsergesrgergseg 3 жыл бұрын
@@xu83r why would u hash credit card info
@cuddenudd7697
@cuddenudd7697 3 жыл бұрын
It has already happened, a cyber gang famous for credit frauds has hid it in cat pictures so that isp wouldnt notice
@wazy1852
@wazy1852 3 жыл бұрын
We went a full circle
@numberiforgot
@numberiforgot 3 жыл бұрын
Before I really started my InfoSec career, I always thought this sort of thing was super drawn out and complicated. Now that I have experience, it’s sort of eye opening to see how easily it can be done.
@manfredpseudowengorz
@manfredpseudowengorz 3 жыл бұрын
until someone blocks the input stream on the FFD9
@cckdex
@cckdex 3 жыл бұрын
@@manfredpseudowengorz as almost any filetype has identifieres this doesnt matter at all
@mehregankbi
@mehregankbi 3 жыл бұрын
don't you think such files should be flagged by windows defender or imageviewer apps?
@MaxCE
@MaxCE 3 жыл бұрын
@@mehregankbi yeah this is why another way this is done is change some pixel values to store data as a sort of pattern, can't be normally seen by humans if the image is high res enough
@WolfyTribe
@WolfyTribe 3 жыл бұрын
Actually real steganography is done in another way, but similar results. Change the least significant bit (LSB) of rgb element in each pixel so that its odd or even. The pattern of odds and even ( 0 and 1 ) will give you a hidden message when you extract. This way you’re basically altering the real image im a way its not distorted instead of adding to the image.
@marco.nascimento
@marco.nascimento 3 жыл бұрын
Quite interesting. We usually know so little about file formats, cool to learn something like that.
@mohammedalshrief532
@mohammedalshrief532 3 жыл бұрын
Machine learning pid iron station test
@claudiu7909
@claudiu7909 3 жыл бұрын
you can hide zip archive in jpg images using the copy comand in cmd. opening it in 7zip will open the archive, but otherwise it will open as a normal image
@ioim_0
@ioim_0 3 жыл бұрын
how exactly if u can wake me through this i would be grateful
@claudiu7909
@claudiu7909 3 жыл бұрын
@@ioim_0 this is the comand copy /b image.jpg + archive.zip output.jpg
@ioim_0
@ioim_0 3 жыл бұрын
@@claudiu7909 tysm man
@Ph34rNoB33r
@Ph34rNoB33r 3 жыл бұрын
Works because a ZIP archive has the metadata at the end (if you add more files to an archive, its metadata is going to grow, so if it's at the end you don't have to move as much data to make space). Learnt about that because back in the 90s, I had some installer that was a shell script with appended zip archive.
@D0Samp
@D0Samp 3 жыл бұрын
@@Ph34rNoB33r It's even simpler than that, it even works with e.g. RAR (which doesn't concentrate metadata on members at all, just adds a list of offsets at the end when you add a "quick open header" to RAR5 archives) or 7-Zip (which has the table of contents at the beginning). Archivers just scan the file until they find an archive file signature to support self-extracting archives, which are just an archive appended to an unpacker executable.
@gauravverma5692
@gauravverma5692 3 жыл бұрын
I did this when I was doing my masters 17 years ago, but in bmp
@asiamies9153
@asiamies9153 3 жыл бұрын
why
@gauravverma5692
@gauravverma5692 3 жыл бұрын
@@asiamies9153 didn't have anything better to do... Had learnt c and had gone through file format... So I was changing specific bits in RGB
@wesleyelder
@wesleyelder 3 жыл бұрын
Awesome! The way you explain things is amazing - I always learn alot. Thanks again!
@evelynx06
@evelynx06 3 жыл бұрын
6:46 There is literally a checkbox there that says "Do not ask this question again"
@sarahshaub3243
@sarahshaub3243 Жыл бұрын
This is great! This was my first time trying steganography and using python and this was super interesting! You did a great job of walking through which each step's purpose was!
@thomasgoodwin2648
@thomasgoodwin2648 3 жыл бұрын
hmmm interesting thought otd. Given recent advances in ai code suggestions, it makes me wonder if gpt3 could be trained to decompile object code to some reasonable facsimile of the original code. The art of code decompiling is even more mysterious than coding since you have to devine meanings of the symbol table just through sometimes very obscure usage. This might be one more opportunity for ai to really shine. Awesome as always. The most interesting materials are never found on the most beaten path. The best stuff is found in the unknown.
@robinferizi9073
@robinferizi9073 3 жыл бұрын
This is cool because it means we can have a way to hide data on open networks, and when sending things to people, or just simply to hide things on your own device, like your you know what photos
@ApiolJoe
@ApiolJoe 3 жыл бұрын
You don't want to send data this way on open networks, it's just not secure.
@robinferizi9073
@robinferizi9073 3 жыл бұрын
@@ApiolJoe not necessarily when people who know what they’re doing involved, but when you have a network full of people who don’t know their way around a computer properly, this is great
@ApiolJoe
@ApiolJoe 3 жыл бұрын
@@robinferizi9073 if they don't know their way around a computer, you don't need this.
@robinferizi9073
@robinferizi9073 3 жыл бұрын
@@ApiolJoe true
@theclockworkcadaver7025
@theclockworkcadaver7025 3 жыл бұрын
@@ApiolJoe Security by obscurity is a legitimate thing. It's only insecure if someone is looking at what you're doing very closely, and looking _specifically_ for this technique -- in which case, you probably wouldn't get past them anyway.
@xzex2609
@xzex2609 Жыл бұрын
Your channel is one of the top 5 , I have learned so much from you , very concise , with necessary information. I thank a lot for all this effort
@b391i
@b391i 3 жыл бұрын
Steganography is a magnificent technique to hide stuff from intruders👌
@JohnnyOttosson85
@JohnnyOttosson85 3 жыл бұрын
Man, this is awesome. I hope I’ll learn more cool stuff from you.
@donnykim9822
@donnykim9822 10 ай бұрын
A problem I found with the hello world part is the FF D9 is always at the end of jpg file, BUT it does not mean FF D9 cannot appear elsewhere in the file. In my case, I found a jpg file that had FF D9 in 2 other separate spots than at the end.
@TheLazyEntrepreneur04
@TheLazyEntrepreneur04 10 ай бұрын
Imagine a person doing this with a silent miner into others people computer to mine crypto. 😂
@novianindy887
@novianindy887 Жыл бұрын
4:02 what happens if we omit b in b"Hello World" ? Cant string be added to the file ?
@eymenknx1004
@eymenknx1004 3 ай бұрын
Files and sockets work with bytes. To get it out as a raw string you have to write a few lines of code
@dovahkiin516
@dovahkiin516 3 жыл бұрын
I downloaded a random image off the internet so I could do this on. I couldn't figure out why I couldn't get it to read, I was able to write to the jpg. Turns out it already has another hidden message inside it that's more complicated to extract lol.
@mathew6041
@mathew6041 3 жыл бұрын
What would happen if the image is being sent through a platform that has image compression, for example whatsapp Will the added data be unharmed?
@KimionTM
@KimionTM 3 жыл бұрын
Gotta try it for yourself but i suspect that the data will be stripped off
@Kitulous
@Kitulous 3 жыл бұрын
@@KimionTM messengers and social networks almost always reprocess the image in order to compress it, so yeah, it will definitely be stripped off
@neptuneairslash3867
@neptuneairslash3867 3 жыл бұрын
Why did it take me until now to realize the python logo can be seen as either 2 pythons or a fat dude sitting in a chair.
@pranaypallavtripathi2460
@pranaypallavtripathi2460 3 жыл бұрын
This is insanely clever for me. Never imagined something like this was even possible. Thank you very much for teaching this to me.
@excalizan7697
@excalizan7697 3 жыл бұрын
I was just curious about that... Thanks NeuralNine!
@NeuralNine
@NeuralNine 3 жыл бұрын
^^
@bloodyyjohnson7004
@bloodyyjohnson7004 3 жыл бұрын
Thank you so much, I always wanted to know how it works, I know I say this every time you see my messages or comments, but you are the holy grail. You learned me so much thing since that last 2 years ! big love on you bro
@NeuralNine
@NeuralNine 3 жыл бұрын
thanks for your kind comment brother :)
@thecashewtrader3328
@thecashewtrader3328 3 жыл бұрын
Wow
@marcelino4828
@marcelino4828 2 жыл бұрын
Thanks NeuralNine. Cool video!
@mA-pg4wu
@mA-pg4wu 2 жыл бұрын
THANK YOU. I have been looking for this tutorial for ages. You can't imageine how much time I spent trying to find a way to do this, thank you so much. btw I'm downloading this video so I won't lose it again
@D0Samp
@D0Samp 3 жыл бұрын
Was a bit disappointed you just appended data to the image file, lots of image upload services just strip data past the end. You can have more success with adding application-specific JPEG segments (APP2..APP15 - APP0 is already used for JFIF and APP1 for Exif) or even encoding hidden messages into the actual quantization matrices.
@tarrvey5619
@tarrvey5619 3 жыл бұрын
I really appreciate these kind of videos. You explaining Stuff which I didnt know existed. Really Cool, now I'm never gonna click a jpeg lol.Hope you get a 100k in a couple of weeks.
@ericepperson8409
@ericepperson8409 3 жыл бұрын
I bought a reference 5700 (non-xt) when they were being discontinued for $270. I spent another $70 to get the Artic Freezer aftermarket cooler. Then flashed it with the XT bios. Since then, AMD has only improved the drivers and performance. The only times I've had any issues were pushing unstable overclocks or with game titles that are notoriously bad to begin with.
@albi-tz4dj
@albi-tz4dj 3 жыл бұрын
at minues 13:49 what have you write behind webcam
@eyosiyas_js
@eyosiyas_js 3 жыл бұрын
That's Insane my man. I really appreciate u. Thanks
@Rahul-ff1vx
@Rahul-ff1vx 3 жыл бұрын
Have been waiting trying to find out how to do these things for months. Thank you so much!!!!!
@phookadude
@phookadude 3 жыл бұрын
So this is usable but wouldn't hide anything from a bytewise search or anyone who knows anything about programming. There's a much better way to hide stuff in images, you write your info into the least significant color bits of the image. If you do it correctly you can even do it with a jpg but a non-compressed file is easier. You can literally just print text that wont be visible in the image and it won't look like a addended file. But if you're going to do this compress your data and at least terminate it with FFD9 so a casual look still looks like a JPG.
@QuadOctane
@QuadOctane 3 жыл бұрын
Quick question - Is it possible to execute a standalone .exe file (which is injected into the .jpg file) when a user opens the .jpg image? Great video btw!
@ahmedyasser8416
@ahmedyasser8416 3 жыл бұрын
a very mean way of hacking 🌚
@alien_X1
@alien_X1 3 жыл бұрын
works on PC but not on mobile
@started.494
@started.494 3 жыл бұрын
@@ahmedyasser8416 حصل يسطا
@unbekannter_Nutzer
@unbekannter_Nutzer 3 жыл бұрын
No, the executable file has to have a special byte sequence at the beginning - in x86 times this was "MZ…" if I remember correctly - look it up with a hexcode editor. Maybe for x64 architecture, a variant is used, maybe it is different. But the file has to start with that.
@Quique-sz4uj
@Quique-sz4uj 3 жыл бұрын
No, its not possible. As i said in another comment: Thats not how it works at all. You can hide a virus / malicious code in a JPEG or any other file really, the thing is that it doenst get executed because its not an executable. When photoshop for example reads the data from the JPEG file it only reads it (to the FFD9) but it doenst execute the rest of the binary lol. The only way to get a virus from opening a jpeg file is with a third party image reader than executes the bytes after the image.
@damnryder
@damnryder 2 жыл бұрын
is it possible to execute the exe file while opening the jpg file in which we hide exe?
@salim.miloudi
@salim.miloudi 3 жыл бұрын
Thanks for the content 👍. I've got a question please. Is there a way to automatically extract and launch the executable file in the background after reaching the EOF flag of the image
@wizdakid1842
@wizdakid1842 3 жыл бұрын
subbed and liked, this gave me an idea for storing programs in files and extracting then running them
@fflecker
@fflecker Жыл бұрын
Thanks a lot. What' s about PNG, TIFF and PDF ? Did you make additional experiments ?
@talkysassis
@talkysassis 2 жыл бұрын
The code in 6:30 is reading the entire file. What's wrong?
@rajeshroshan2877
@rajeshroshan2877 3 жыл бұрын
But how would you execute that .exe file embedded in the image file?
@akshitsingh6429
@akshitsingh6429 3 жыл бұрын
Extract the byte data to another file, then run it
@ToastyTastyPancakes
@ToastyTastyPancakes 3 жыл бұрын
@@akshitsingh6429 yeah
@rajeshroshan2877
@rajeshroshan2877 3 жыл бұрын
@@akshitsingh6429 Thank you! But I was wondering if there's a way to run the .exe when the image is clicked or pressed if on a phone.
@ellie-g9o
@ellie-g9o 2 жыл бұрын
@@rajeshroshan2877 That would be a huge security risk, think about it. It's definitely not possible, at least without exploiting bugs
@RagHelen
@RagHelen 3 жыл бұрын
But why? It is good for nothing. Moreover, exe files have inital sequences, too, and if antiviral software detects these inside an image file, they will got to defcon 1. You actually increase the probailty of being detected dramatically.
@raghuramelancheran9979
@raghuramelancheran9979 3 жыл бұрын
Very informative. But I've a question. Let's say I download some jpeg by mistake, which has hidden exe. How can someone make this exe extract itself and run on my device? What are the steps I can do to prevent that from happening? Because tbh there is no way to know which image is infected and which isn't, and it's not possible to stay away from downloading images at all. Should I write a python code to check the images by myself? And will that exe stay inside the image safely till I'm able to verify the image using python?
@boogychan
@boogychan Жыл бұрын
That's interesting.
@nemanjakukic4519
@nemanjakukic4519 3 жыл бұрын
No need for python here. For bash/zsh, this will do: `cat heart.png >> photo.jpeg`. It will work with any other file :D Windows shell uses `type` instead of `cat`.
@kantasisg
@kantasisg 3 жыл бұрын
Good thinking but how you'd suggest extracting the heart.png from the jpeg in bash?
@thomasipad7719
@thomasipad7719 3 жыл бұрын
If the JPEG ends at that 2 Bytes, why not just append the binary? Like “cat binary.exe >> image.jpg”
@thomasipad7719
@thomasipad7719 3 жыл бұрын
@Dee_lan Of course. You just need to find the 4 bytes and then write out the rest. But when creating the files, you can simply append and be finished.
@luphoria
@luphoria 3 жыл бұрын
There is nothing wrong with this approach :p. The target of this video is beginner CS students that are interested in cybersec, I think, so they are less comfy with cmd or sh D:
@1jobhunt
@1jobhunt 2 жыл бұрын
All files in image. DL fir security check onto usb from email... use code editor to scan? Or will it exicute upon opening?
@唐裕辉-z2c
@唐裕辉-z2c Жыл бұрын
thanks ur share.I have a question,how to insert codes to a jpg file, whilch can execute the code inside once the jpg file is opened
@vdofficialchannel9841
@vdofficialchannel9841 3 жыл бұрын
with open("Spagetti.jpg",'ab') as f, open('MinecraftLauncherV2.0©.exe','rb'): f.write(e.read()) When i execute this It says io.UnsupportedOperation: read
@goranbekic1911
@goranbekic1911 3 жыл бұрын
Does this work as the old DOS copy /b command? If so, if I remember correctly, you can skip the extraction part and just change the extension to which part you want to see (e.g. photo.jpg opens in photo editor, photo.txt opens in notepad and shows just the text Hello world)...
@Alessandroale74
@Alessandroale74 3 жыл бұрын
Copy yes true, but when change extension then the program start to read every time from first byte, not from the second file hidden inside, so you will have simply a notepad full of ascii characters before the final correct text
@avizaguri5823
@avizaguri5823 3 жыл бұрын
Is it possible to execute the .exe file from the image? I mean, when I open the image, the exe will execute
@luphoria
@luphoria 3 жыл бұрын
It's possible. Probably, at least. Is it realistic? No
@higiniofuentes2551
@higiniofuentes2551 2 жыл бұрын
Any suggestions to how would be to run an inside program each time you open the image? Thank you!
@santiagohernandez6615
@santiagohernandez6615 2 жыл бұрын
Awesome this was really interesthing and useful, thanks NeuralNine
@GooogleGoglee
@GooogleGoglee 3 жыл бұрын
The thing that is not clear to me is : when you search for the index in the file, how are you sure that the bytes FFD9 do not appear also before the end of the file image?
@dfgfdgdfgfdg2902
@dfgfdgdfgfdg2902 3 жыл бұрын
because thats how jpg files are structured
@luphoria
@luphoria 3 жыл бұрын
JPEG hex may look random but it's fully documented, so it is designed that there will never ever ever EVER be any FFD9 other than at the end :D
@donmbelembe1089
@donmbelembe1089 3 жыл бұрын
what if you send the jpg file via WhatsApp or Facebook, their compression mechanism is going to remove the appended bites?
@YackaSnacka
@YackaSnacka 10 ай бұрын
Sorry really fucking late reply but yes the bastards remove the appeneded bytes
@1jobhunt
@1jobhunt 2 жыл бұрын
You could also send to phone and use an image reader possible
@agent-33
@agent-33 3 жыл бұрын
I once took a peek of what's inside the APK of a mobile game I have and I see only one image file with size like 100MB. The photo is damaged or nothing to display so I suspect the files and resources are in that image file. After watching this, everything becomes clear now.
@doctorrare1259
@doctorrare1259 3 жыл бұрын
Where are stored the Metadata?? Before the FFD8 at the begining?? At the end??
@ForesteamIV
@ForesteamIV 3 жыл бұрын
Wow, you've just invented an archiver
@rons96
@rons96 6 ай бұрын
this is cool, by obvious for people searching for a payload. Why modify the pixels like the png steganography tutorial don't work with jpeg? Thank you btw for this video
@kapilsonyt
@kapilsonyt 3 жыл бұрын
Scary stuff man!!! Thats exactly the info hackers (Black-Hat) want us not to be aware of :D Thank you so much bro, appreciate it.
@razziel4599
@razziel4599 3 жыл бұрын
ayyy xkcd!
@IzUrBoiKK
@IzUrBoiKK 3 жыл бұрын
Lol, this is a funny topic but can be useful (for rick rolls)!
@hedgy7378
@hedgy7378 2 жыл бұрын
I know I'm late but is there a way to run the executable embedded in the image in the python script without writing it to disk?
@EW-mb1ih
@EW-mb1ih 3 жыл бұрын
Nice video! Do you have any practical application of this ?
@MackPaddy
@MackPaddy Жыл бұрын
Hiding copyright information inside of the image. Not sure if it will disappear if the image is edited or renamed, though. Still learning that.
@cray-rg6qt
@cray-rg6qt 3 жыл бұрын
Hey I've got problem at the very beggining. For some reasons my write function doesn't work and I can't append "Hello World" to my jpg
@thomasgoodwin2648
@thomasgoodwin2648 3 жыл бұрын
Mind if you do come across something in the wilds of the net I wouldn't run it unless you really know what you're doing. (Sandbox VM, profilers, decompilers, etc)
@SirusStarTV
@SirusStarTV 3 жыл бұрын
I think many social websites just get rid of everything you hidden in the image. They process the image and compress it (and maybe inject their own metadata)
@vdofficialchannel9841
@vdofficialchannel9841 3 жыл бұрын
Thats why we modify the Hex
@viorisewastaken
@viorisewastaken 3 жыл бұрын
So that's why TF2 only works with the coconut.jpg
@Manuel-j3q
@Manuel-j3q 3 жыл бұрын
Rare jpeg market stocks goes down after this video.
@nizarbelhiba
@nizarbelhiba 2 жыл бұрын
The question now is how to execute the injected exe file or extract the injected image file automatically only by opening the jpeg file
@rafaelfonseca7942
@rafaelfonseca7942 9 ай бұрын
Thought you'd show how to open an image and have an executable run somehow also. Anyway, liked these image tricks!
@Tristoo
@Tristoo 3 жыл бұрын
bruh. here I thought you were actually gonna do something smart with pixels. you're also banking on the parser not checking for bigger file size, I doubt it's actually part of the spec that you can just have whatever there. Basically making a 16m long video to say "do a concat".
@Jm7wtf
@Jm7wtf 3 жыл бұрын
But can the executable file be opened automatically without any program while I open the jpeg file
@brpawankumariyengar4227
@brpawankumariyengar4227 3 жыл бұрын
Awesome ….. Incredible ….. this is Amazing 🤩
@razziel4599
@razziel4599 3 жыл бұрын
now to hide a rickroll in an image :>
@vdofficialchannel9841
@vdofficialchannel9841 3 жыл бұрын
oH you copied my idea hahahah
@razziel4599
@razziel4599 3 жыл бұрын
@@vdofficialchannel9841 or I just decided to do something of my own will with no knowledge of other people's ideas and their supposed claims on them
@rhanditaher1468
@rhanditaher1468 8 ай бұрын
but how can the exe file run automaticlly if the jpg file was opened
@MA-748
@MA-748 3 жыл бұрын
But can you hide a .jpg in a .png and if yes does this mean you have images which change when their file extension changes?
@unbekannter_Nutzer
@unbekannter_Nutzer 3 жыл бұрын
No, unless you write a viewer for that purpose. Images start with a significant bytecode, and if the program gets a JPG at the end of a PNG file or vice versa (I don't know, whether PNG has a similar end mark), named after the second file, the program usually does one of 2 things: Either it relies on the file extension, gets a mismatch in the prefix and bails out, or it ignores the extension, reads the first bytes and deals with that information and stops interpreting, when it hits the FFD9-mark.
@viane123456
@viane123456 3 жыл бұрын
Its just a steganography, Better to use encryption before just adding a normal message
@usprpc
@usprpc 3 жыл бұрын
how i can write my python code in jpg like when i open photo app will opened too?
@-Burs
@-Burs 3 жыл бұрын
Hmm.. Interesting. So this "FFD9" will occur only once even if jpeg file is hundreds of megabytes in size, and/or having gigapixels inside it? Hard to believe it, but it's math I guess..
@luphoria
@luphoria 3 жыл бұрын
It basically is defined in JPEG format to be impossible anywhere else. In encoded JPEG data you cannot ever get value FFD9 until the end. It may seem like encoded nonsense but it actually is all intentionally designed as such! :D
@its_code
@its_code Жыл бұрын
Can I run exe inside jpg😢😢😢
@miryamadvanced
@miryamadvanced 3 жыл бұрын
dear can you make one clip for bind apk with image if when opening image that apk its launcher as automat
@devtadeo
@devtadeo 3 жыл бұрын
what if make an image that shutdowns your pc
@saivarunnamburi6195
@saivarunnamburi6195 3 жыл бұрын
How can we know before that injected data is image or exe file or some other files without extracting @neuralnine
@wittmackbrian2731
@wittmackbrian2731 2 жыл бұрын
How can i make the executable hidden in the picture to autorun
@maxliberman3015
@maxliberman3015 3 жыл бұрын
Something is not working for me, my code is the same as yours but when i try to get the string it prints me all the code and not just the "Hello world"
@maxliberman3015
@maxliberman3015 3 жыл бұрын
Its like the offset function does not work, help plsss
@PhillipDawson10
@PhillipDawson10 3 жыл бұрын
@@maxliberman3015 probably means your image has more than 1 image, so main image plus thumbnail. the append will append it to the end, but the seem will find the first occurrence of the FFD9 and set that as the offset. Your search will have to look for the last occurrence of FFD9
@lengors1674
@lengors1674 3 жыл бұрын
Is there any utility to this besides hiding info from the average user?
@aratakarkosh9588
@aratakarkosh9588 3 жыл бұрын
Does any compresser algorithm cut down the part after FFD9 ?
@luphoria
@luphoria 3 жыл бұрын
Most online services do.. there are other more sleuthy ways to hide data in JPG though. Hint: read documentation :)
@jonathan3488
@jonathan3488 3 жыл бұрын
Is it possible to hide short videos too inside an image ?
@luphoria
@luphoria 3 жыл бұрын
Yes!
@hwzzegwggs8029
@hwzzegwggs8029 3 жыл бұрын
Thank you for this video
@NeuralNine
@NeuralNine 3 жыл бұрын
thanks for watching!
@saultamez7660
@saultamez7660 2 жыл бұрын
@@NeuralNine what Hex Editor software are you using currently? I am trying to find those that are for free.
@landxshort
@landxshort Жыл бұрын
So, how to run program when click the photo
@waaaaaaah5135
@waaaaaaah5135 3 жыл бұрын
This is absolutely amazing! Could you do the same with video files?
@ariesarkar
@ariesarkar 3 жыл бұрын
Video files are too big and would raise suspicion (if one has common sense)
@aloushi138
@aloushi138 4 ай бұрын
Which program is he using?
@davidbarrar5968
@davidbarrar5968 3 жыл бұрын
Is this also called Steganography?
@yannemalovskiy8846
@yannemalovskiy8846 3 жыл бұрын
Thanks a lot for your vids! Great job!
@oriabnu1
@oriabnu1 3 жыл бұрын
offset = content.index(bytes.fromhex('FFD9')) Traceback (most recent call last): File "", line 1, in ValueError: subsection not found can some one help me
@CoentraDZ
@CoentraDZ 3 жыл бұрын
I like your content 💪🔥
@Creative-f5z
@Creative-f5z Жыл бұрын
Excellent Content !!Thank You!!!
@michalski9141
@michalski9141 3 жыл бұрын
it just prints out the entire file instead of the message :/
@sethadkins546
@sethadkins546 3 жыл бұрын
Is there anything preventing you from putting code before the FFD9 thus executing code whenever you open the file?
@juniorz289
@juniorz289 3 жыл бұрын
That's what I was thinking. Anyone knows how that would turn out?
@juniorz289
@juniorz289 3 жыл бұрын
I think it will automatically change the file extension.
@lukewolfe3951
@lukewolfe3951 3 жыл бұрын
The data before FF D9 is information about the image or the information regarding the pixel colors of the image. So, no, you cannot do that without rendering the image unusable. The act of putting data after the FF D9 is referred to as using “slack space” and can be done in other file types besides JPGs. Also, you cannot get the program opening the file to run some code you tacked on to the end unless you find an underlying flaw in the program used to open the file.
@Quique-sz4uj
@Quique-sz4uj 3 жыл бұрын
As i said in another comment Thats not how it works at all. You can hide a virus / malicious code in a JPEG or any other file really, the thing is that it doenst get executed because its not an executable. When photoshop for example reads the data from the JPEG file it only reads it (to the FFD9) but it doenst execute the rest of the binary lol. The only way to get a virus from opening a jpeg file is with a third party image reader than executes the bytes after the image.
@lukewolfe3951
@lukewolfe3951 3 жыл бұрын
@@Quique-sz4uj that’s literally exactly what I said…
@higiniofuentes2551
@higiniofuentes2551 2 жыл бұрын
Thank you for this very useful video!
@private5866
@private5866 3 жыл бұрын
Hi, can you mention a few good use cases of this functionality?
@adamberred
@adamberred 2 жыл бұрын
You can use it to hide malicious code
@NonuGamezRobloxE
@NonuGamezRobloxE Жыл бұрын
@@adamberred but the malicious code wont execute when one opens the image file
@adamberred
@adamberred Жыл бұрын
@@NonuGamezRobloxE you can hide in the files of a program and make the exec file read the image
@victor_sztuka
@victor_sztuka 3 жыл бұрын
Thanks bro, well done👍
@ZÏ̇̃
@ZÏ̇̃ 3 жыл бұрын
I cant get enough of that intro
How are Images Compressed?  [46MB ↘↘ 4.07MB] JPEG In Depth
18:47
Branch Education
Рет қаралды 3,7 МЛН
Hide Secret Messages in PNG Files
28:14
NeuralNine
Рет қаралды 25 М.
When you have a very capricious child 😂😘👍
00:16
Like Asiya
Рет қаралды 18 МЛН
人是不能做到吗?#火影忍者 #家人  #佐助
00:20
火影忍者一家
Рет қаралды 20 МЛН
Каха и дочка
00:28
К-Media
Рет қаралды 3,4 МЛН
Что-что Мурсдей говорит? 💭 #симбочка #симба #мурсдей
00:19
Are You Using the WRONG Image Format?
16:20
ThioJoe
Рет қаралды 775 М.
Python Socket Programming Tutorial
49:43
Tech With Tim
Рет қаралды 1 МЛН
The most important Python script I ever wrote
19:58
John Watson Rooney
Рет қаралды 213 М.
7 Outside The Box Puzzles
12:16
MindYourDecisions
Рет қаралды 70 М.
This Insane Virus Trick Would Have Fooled Me - Watch Out!
7:53
Secrets Hidden in Images (Steganography) - Computerphile
13:14
Computerphile
Рет қаралды 1,3 МЛН
Where Does Bad Code Come From?
42:21
Molly Rocket
Рет қаралды 209 М.
Access Location, Camera  & Mic of any Device 🌎🎤📍📷
15:48
zSecurity
Рет қаралды 2,8 МЛН
When you have a very capricious child 😂😘👍
00:16
Like Asiya
Рет қаралды 18 МЛН