Skip to content

Pentestblog

Menu
  • Home
  • Kali Linux
  • Blog
  • CTF Challenges
  • Course
    • Download Free Videos
  • Contact Us

How to Hide Payloads & Backdoor Inside Images

By Pentestblog 21/04/2021 Blog 2 Comments
Hide Payloads Inside Photo

ExifTool : Hide Payloads Inside Images

In this blog, we will explore various methods to hide payload inside an image. For that, we will use ExifTool that is pre-installed in Kali Linux. There are several features inside ExifTool, For example, Hiding payload, extracting metadata, etc. ExifTool gives us the easiest way to extract metadata inside images. It is a free and open-source tool developed by Phil Harvey.

Table of Content

  • Introduction to ExifTool
  • Installation
  • Hide Payloads & Backdoor inside image

Introduction to ExifTool

As you know, we have earlier mentioned exiftool. The purpose of ExifTool is to read, write and manipulate the metadata of an image. Assume! While solving the CTF challenges, we have seen that port 80 is open into the target system. Without wasting time, we started scraping the webserver. After doing hard work, we found an image in the target system which may be an essential secret hidden. We don’t have any knowledge to extract metadata from inside an image. Now we will apply ExifTool to extract metadata from the image.

Installation

The process of installing ExifTool is easy in Kali Linux. In other operating systems could be different. To install exiftool in Kali Linux, we need to run the following command.

  • apt-get install exiftool
  • apt-get install libimage-exiftool-perl
installation of exiftool

To get more information about ExifTool, you should read the manual page.

  • man exiftool | more
manual of exiftool

Hide Payloads & Backdoor inside image

From the below image, you can notice that two types of files available inside the ExifTool folder.

  1. pentestblog.png
  2. shell.php

We will extract the entire metadata of the pentestblog.png image with the help of ExifTool. Sometimes during the CTF challenge, the passwords are stored inside the image. We need to execute the given below command.

  • exiftool pentestblog.png | more
metadata

We have designed a payload inside the “shell.php” file that opens the door for code execution on a web server so that attackers can easily access your system.

payload

Now we will hide the payload inside the “pentestblog.png” image. According to the below image, we have already mentioned: “shell. php“
To hide this type of payload, follow the below command.

  • exiftool "-comment
hide payload inside image

We were able to hide the payload inside the image. I hope you liked this blog.

  • strings pentestblog.png | grep system
successfully add

Again we will extract the entire metadata of the pentestblog.png image with the help of ExifTool. Now you can notice that our payload has attached to the comment field.

  • exiftool pentestblog.png

Latest Posts


  • Protected: How To Mount USB Drive in Ubuntu Linux
  • CVE-2022-30190 (Follina)-Microsoft Support Diagnostic Tool Vulnerability
  • SQL INJECTION – Extracting Username and Password From Database
  • How To Dump Username And Password Using SQLMap Tool?
  • Protected: Exploit Apache Log4j Security Vulnerabilities – CVE-2021-44228

⭐⭐⭐⭐⭐

Rating: 5 out of 5.
  • Protected: How To Mount USB Drive in Ubuntu Linux
  • CVE-2022-30190 (Follina)-Microsoft Support Diagnostic Tool Vulnerability
  • SQL INJECTION – Extracting Username and Password From Database
  • How To Dump Username And Password Using SQLMap Tool?

How to Bypass WordPress Website Login using SQL Injection?
Remove RAR /7-zip/PDF/M.S Office/ Zip Password Online
How to Hack WiFi Password Step by Step on Laptop
CTF Challenges for Beginners

Related

2 Comments

  1. Ryan Harish 09/09/2022

    The professional hacker true out the word that I believed in him is only Henryclarkethicalhacker Group Hackers Checked Google and see everybody comments on him he a professional that I believed in him if you have problems on any stuffed like a bank, company, school grades change examinations, database, Social media hacks, Email hacks, Phone hacks, Bitcoin hacks, increased Credit score boost to 800, School result upgrading, cryptocurrency, Binary option funds recovery, Bitcoin Mining, Instagram, WhatsApp, Twitter, Monitor your colleague, access your spouse social media, and a lot more, via, , on whatsapp 18134211326..

    Reply
  2. Lizzy Agnes 24/09/2023

    A great hacker is really worthy of good recommendation , Henry
    really help to get all the evidence i needed against my husband and
    and i was able to confront him with this details from this great hacker
    to get an amazing service done with the help ,he is good with what he does and the charges are affordable, I think all I owe him is publicity for a great work done via, , and you can text, call him on whatsapp him on +12014305865, or +17736092741,

    Reply

Add a Comment

Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Protected: How To Mount USB Drive in Ubuntu Linux
  • CVE-2022-30190 (Follina)-Microsoft Support Diagnostic Tool Vulnerability
  • SQL INJECTION – Extracting Username and Password From Database
  • How To Dump Username And Password Using SQLMap Tool?
  • Protected: Exploit Apache Log4j Security Vulnerabilities – CVE-2021-44228

Recent Comments

  • Lizzy Agnes on How To Install AnyDesk In Ubuntu 20.04/18.04
  • Lizzy Agnes on Hack The Box (HTB) OSCP-Like machines List 2022
  • Lizzy Agnes on What is Termux? How To Use Termux Basic Command As a Beginner?
  • Lizzy Agnes on Download Our Best Hacking Videos Deleted by Youtube
  • Lizzy Agnes on Top 10 Best Computer Hacking Gadgets List 2022 For Hackers

Archives

  • January 2023
  • June 2022
  • May 2022
  • January 2022
  • December 2021
  • November 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021

Please Share

0
0
0
1
0
0
0
0
0

Follow Us

Pentestblog Youtube

RSS Pentestblog

  • Protected: How To Mount USB Drive in Ubuntu Linux

Categories

  • 0 Day CVE
  • 0-Day
  • Android Hacking
  • Apache Log4j
  • Blog
  • CTF Challange
  • CVE
  • Ethical Hacking
  • Gadgets
  • Hack the Box
  • Kali Linux
  • nothing
  • OSCP
  • Phishing
  • SQL Injeciton
  • SQL Injection
  • WordPress Hacking

Other Pages

  • Privacy Policy
  • DMCA
  • Terms and Conditions
  • About Us
  • Contact Us
  • Our Videos
  • Our Course
  • CTF Challenges
Pentestblog Copyright © 2024.
Created by Sandeep Yadav (Ethical Hacker) Back to Top ↑