Skip to main content

Steganography:-Hide file inside another file(What and How)

Note: -This is only for Education Purpose. I am not responsible for whatever you do. But Please don't misuse the information.

What is Steganography? Ans:-Steganography is a process of hiding necessary information inside ordinary things. This process is very antique(old and valuable) and this is also used in World Wars.

In Hacking and Cyber Security, this method is very useful to protect information go get in wrong hands.

If you had don't read the blog in which I had told you about the use of Steganography then please view it. Click here to see:-Your Card Details Can Be Hacked.


Then We had known about Steganography. Then How to do it?

How To Do Steganography?

Here we will hide a video inside a photo.

First, take the files you want to do with. Example a photo and a video.

See Picture

As you can see there is one video which I had selected and one photo.
Then just Compress the file you want to hide inside another.
Example:-SEE Picture
You can see that I had made a zip file of Video. Then Rename the compressed file to an easy name for your ease as the video name is so long and photo name is very complex with date, time, etc. So I will recommend you to rename it. See Picture below:-
 as You can see I had rename Video to Video and Photo to photo.

Then in the same folder. Press Shift + Right click to open Command prompt here.
See Picture:-
After Opening It type in command prompt without quotes "copy /b photo.jpg + Video.zip newfile.jpg" in place of photo.jpg you should type your file name with its extension and in place of Video.zip you should type your own compressed file name with its extension and in place of the newfile.jpg you should type the new file name you want to create with its extension.
See Picture Below:-
After that, it will copy your compressed video file to your photo and you will see the size of your photo will increase.
See Pictures:-

You Can see the size of one photo is 36.9 MB which is very large for a photo. It means some other is also there which is our video file.



How to get The Hidden File?

Ans:-Simply Extract The Photo. You will get the hidden file.

Remember:-You Can create all files through it. But The new file name should have the same extension as of the file before + sign to work it normally as a normal file otherwise it will not open.


How To Trick With Hackers?

=>As I had told you in my previous blog that you can trick hackers not to open it, Then How To Do It?

Have not read my previous blog then go and read. Click Here to read

Trick hackers, you should first make one file hidden in another.
example X.jpg contain my important file then again do the same process with X.jpg and another junk file
so that hacker will only find junk file inside file before reaching the main file. Name it to Y.jpg suppose.

Do the process with junk files as many time as you can. So that hacker only finds junk and give up extracting any more. But you have to do a lot of work in making and extracting it. But it will make your file secure.


This is all for today. If you have any question, suggestion or you want that I should make a blog on your cyber topic then tell me in the comment section below. Hope you like this post.

Comments

Contact Form

Name

Email *

Message *

Popular posts from this blog

Social Engineering.What is it ?

Note:- This is only for Educational Purpose. I am not Responsible Whatever you do. Black Hat hacking and cracking and Black Hat SEO are illegal, You may be jailed for doing this. Social Engineering? => The Process of tricking or a good plan to get your work done is known as Social Engineering. This is very useful in our day to day life and it will make your life very. Social Engineering is used by every person like Shopkeeper, Whole Seller, Large Companies, Hackers & Crackers. We Will does not discuss shopkeeper or whole sellers or companies. As this blog is on Cyber Security So What Will We Discuss about. Ya, We will discuss Hackers and crackers. I will not tell you How they use but Why they use as our Honorable Google does not allow it. So, Let's Begin it? Why Social Engineering? =>Suppose you had made a virus and you told your friend to use, will your friend use it. If yes comment me below. But in most case, they will never use that vi...

Zero Day Vulnerabilities| How to Be Safe?| Get Job with HUGE Salary.

Zero Day Vulnerabilities:- Hey, it's me, Arshad Aman, back again. Note:- This is only for Educational Purpose. I am not Responsible Whatever you do. Black Hat hacking and cracking and Black Hat SEO are illegal, You may be jailed for doing this.

TOR | Dark WEB | You can Buy Spirit here......

Hey, it's me, Arshad Aman, back again.  Note:- This is only for Educational Purpose. I am not Responsible Whatever you do. Black Hat hacking and cracking and Black Hat SEO are illegal, You may be jailed for doing this. This is a technical blog but in the title, you had seen that I am going to tell that you can buy spirit. Ya, you had seen it is true. Here I am going to tell that You can buy a spirit on the internet. Without wasting any time lets get started. Layers on the internet:- The website and anything that you are visiting is only 1% of the total internet. Ya, it is true only 1%. That is called the Surface Web which is available or indexed on google or any other search engine. The most of the internet is hidden and not accessible to the normal internet user.  After the Surface Web, The next to come is Deep Web. Deep Web:- This is basically a website which is not indexed in any search engines like google. You need a link to enter into. This...