hacking by Vineet Bharadwaj, Wifi Hacking, Facbook hacking, Gmail Hacking,android hacking,thehackingguide, Hacking by Vineet Bharadwaj, Website hacking, Mobile Hacking, Security, Hack Account, learn hack by vineet Bharadwaj,kingroot.apk rooting,windows tricks, Hack Facebook Account, Hack Gmail Account, Wifi hacking, Mobile Hacking, Learn Hacking, Security, Mobile USSD Code Hack, Tanki online Hack, Ip Address Hack,Hk rom Editor, Website Hacking, Lucky patcher, Facebook Hack,Kingroot android

What is Steganography ?


Is the art and science of hiding messages, Images, Data .etc in such a way that no one, apart from the sender and intended recipient, suspects the existence of the Data, a form of security through obscurity. By using this trick your data will get hidden into any image of your choice without reducing its quality, In following tutorial i will show you how you can hide data behind images without using any software:

1. Create a folder in your C drive and name it as “hide”

2. Copy all the images you want to hide and also the image behind which you want hide into this directory.

3. Now select the images you want to hide and add them to archive i.e keep them in winrar.
Now you will see one more file named “hide.rar” in your directory.

4. Now open command prompt and change your root to your current directory as shown in the image and type the following command:

Copy /b aish.jpg + hide.rar output.jpg

Here “aish.jpg “ is the image behind which you want to hide.
“hide.rar” is the file of images to be hidden.
“output.jpg “ is the output file that we want.

After executing the following command, we will see an extra image called “output.jpg”

Now you can delete all the files except “output.jpg”. If you double click the file, it opens a normal image. But you can see the hidden files by opening the file with winrar.

This tutorial can be used for any type of files like mp3,wmv,txt etc
can we hide keylogger(remote installation file, .exe file) behind the image in this way... so it can be automatically executed when run by the victim??? - No, because it should be opened as an executable to open the file.
i.e we cant open it unless we have an executable code in it.
Next Post »