Latest Hacking Tricks 2025 | Ethical Hacking Tricks

Hacking Tricks 2025 | Facebook Hacking 2020*Latest* | Internet Tricks | Tech Tricks 2020| Hacking Apps 2025 ,TechTricks,TechBuzz,TechGuru 2025| SEO Tutes 2025 | Google ADSENSE tricks 2025 | All Hacks of 2025 ,Techhacks 2026,Tech Updates , Hacking Hacking World Hacking Tricks 202025

How to Hack a Computer Using Just An Image 2015

in: cyberattck Hacking groups How to Security Breakers WhtasNew !!
Next time when someone sends you a photo of a cute cat or a hot chick than be careful before you click on the image to view — it might hack your machine.


Yes, the normal looking images could hack your computers — thanks to a technique discovered by security researcher Saumil Shah from India.

Dubbed "Stegosploit," the technique lets hackers hide malicious code inside the pixels of an image, hiding a malware exploit in plain sight to infect target victims.

Just look at the image and you are HACKED!


Shah demonstrated the technique during a talk titled, "Stegosploit: Hacking With Pictures," he gave on Thursday at the Amsterdam hacking conference Hack In The Box.

According to Shah, "a good exploit is one that is delivered in style."

Keeping this in mind, Shah discovered a way to hide malicious code directly into an image, rather than hiding it in email attachments, PDFs or other types of files that are typically used to deliver and spread malicious exploits.

To do so, Shah used Steganography — a technique of hiding messages and contents within a digital graphic image, making the messages impossible to spot with the naked eye.

Here's How to Hack digital pictures to send malicious exploits:


Until now Steganography is used to communicate secretly with each other by disguising a message in a way that anyone intercepting the communication will not realise it's true purpose.

Steganography is also being used by terrorist organisations to communicate securely with each other by sending messages to image and video files, due to which NSA officials are forced to watch Pornand much porn.

However in this case, instead of secret messages, the malicious code or exploit is encoded inside the image’s pixels, which is then decoded using an HTML 5 Canvas element that allows for dynamic, scriptable rendering of images.

The "Secret Sauce" behind Stegosploit — this is what Shah calls it.


"I don’t need to host a blog," Shah told Motherboard, "I don’t need to host a website at all. I don’t even need to register a domain. I can [just] take an image, upload it somewhere and if I just point you toward that image, and you load this image in a browser, it will detonate."
The malicious code, dubbed IMAJS, is a combination of both image code as well as JavaScript hidden into a JPG or PNG image file. Shah hides the malicious code within the image’s pixels, and unless somebody zoom a lot into it, the image looks just fine from the outside.


Video Demonstration:


Shah demonstrated to Lorenzo Franceschi of Motherboard exactly how his hack works. He used Franceschi’s profile picture and then prepared a demonstration video using his picture as the scapegoat.

In the first video presentation, Shah shows a step by step process on how it is possible to hide malicious code inside an image file using steganography technique. You can watch the video given below:



In the second video, Shah shows how his Stegosploit actually works. His exploit works only when the target opens the image file on his or her web browser and clicks on the picture.

You are HACKED!

Once the image is clicked, the system’s CPU shoots up to 100 percent usage, which indicates the exploit successfully worked. The malicious code IMAJS then sends the target machine’s data back to the attacker, thereby creating a text file on the target computer that says — "You are hacked!"



Shah also has programmed his malicious image to do more stealthy tasks, like downloading and installing spyware on victim’s machine, as well as stealing sensitive data out of the victim’s computer.

The bottom line here is:


You should not presume the image files as "innocent" anymore, as they can hide malicious code deep inside its pixels that could infect your computers.

Therefore, always make sure before you click on one.


Shah has been working on the research [PDF] during his spare time for almost five years, but he has not tested his technique on popular image sharing websites like Dropbox or Imgur. He also admitted that his method might not work everywhere.

SOURCE- THEHACKERNEWS

0 comments:

Post a Comment

Newer Post Older Post Home
Powered by Blogger.
  • Hacking Tricks 2015
About Mukesh Bhardwaj

Categories

ANDROID TRICKS updatenews Facebook Tricks How to cyberattck passwordcracking COMPUTER TRICKS Mukesh Tricks android anonymous SOFTWARES Security Breakers WhtasNew !! NOTEPAD/CMD TRICKS WINDOWS Brilliant Hackers Hacking groups facebook twitter hacking Other Whatsapp Tricks hacker news chrome wifi Hacking hackerone how to run a game smoothly without graphic card Games Hacks Tech bank hacking coolmuster iphone hacker software hackerrank PDF Tricks best hacker typer hackers game how to run any game without graphics card no no root recorder root run commands screen techtricks top 5 whatsapphijacked

About Me

GATE 2017
View my complete profile

Popular Posts

  • Download Faceniff Apk PRO v2.4.4 (LATEST) 2019
    Download Faceniff apk 2019 Faceniff apk Cracked [Latest version 2.4] for android is a fantastic app to hack facebook.. . This Hack...
  • How to Hack Facebook Account From Android 2019
    How to Hack Facebook Account From Android 2019 Hack Facebook Account From Android 2016 By Mukeshtricks4u Must Read - How To Ha...
  • Latest Facebook Hacking Tricks 2019 - Hack Facebook Account (Latest Hacks 2019)
    Latest Tricks To Hack Facebook Accounts Easily Facebook Hacking Tricks 2019 - Hack Facebook Account 2019 Online  (All Latest Techniqu...
  • Hack Facebook Account Using Backtrack 5R3 (Latest) 2016
    Hack Facebook Account Using Backtrack 5r3 Now A days Facebook Hacking Is Not Easy. but we are here to help you by teaching some methods...
  • Hack Facebook Account By Cookie Stealing And Session Hijacking Wiith Wireshark 2016
    Hack Facebook Account By Cookie Stealing And Session Hijacking Wiith Wireshark Wireshark Software to capture cookies: Wireshark is the best ...

Also Read:

Windows 10 Product Keys Windows 7 Keys

Alexa Rank

Pages

  • Home
  • About
  • Disclaimer

Services

Best Website Designing Company in Himachal Prdaesh Website Designing Services Himachal Padesh Digital Marketing & SEO Services in Himachal Pradesh

All Rights Are Reserved · · All Logos,Template & Trademark Belongs To Their Respective Owners ·[Mukesh Bhardwaj]

"© Copyright 2016-17 DMCA Protected" Ethical Hacking Tricks Mukeshtricks4u