Skip to main content

how to hide a file in jpg



                 How to hide files in a jpg 


Set up
1. Must have a .zip or .rar compressor. 

2. Willingness to learn. 

Steps
1. Save the picture of choice to your desktop. 

2. Make a new .rar or .zip folder on your desktop. 

3. Add the files you want to hide into the .zip or .rar 

4. Click start menu, run, cmd. 

5. In Command Prompt type cd "desktop" with the quotation marks.

 6. Now type in copy /b picturename.jpg + foldername.rar outputfilename.jpg ( If you use .zip then: copy /b picturename.jpg + foldername.zip outputfilename.jpg) 

7. Now there should be the outputed file name with a .jpg extension on the desktop. ( Do not close Command Prompt just yet ) 

8. Double click it to open the picture and check it out. 

9. When your done looking, and want to view the hidden files Type: ren outputfilename.jpg outputfilename.rar or zip 


Now you're done! 

A quick info-fact:

With this technique of hiding files in a jpg you can send this to anyone and they just have to rename the file extension to .zip or .rar. With this technique the Al-Qaeda operatives were able to send info to others secretively


for more content you can subscribe our YouTube channel 
join our telegram channel here

Comments

Popular posts from this blog

How to Start With Hacking

How to start with hacking Everything discuss here is for ethical hacking not for any illegal or unethical hacking  topics discussed here are: Types of hacking jobs on hacking what to do on jobs how to start with hacking where to start Types and jobs on hacking First you need to know for what you want to learn hacking their are 2 types of hacking first one is defensive and second one is offensive further it is divided into black white and grey hat hackers also but that is different thing In offensive hacking you will have to perform hacking on different websites and if you find any vulnerability you have to report it to the owner of website (this is the thing hackers do on bug bounty program) if you are on any company for which you are hacking you have to submit the report to the analyst or hunter ( hunter is the high post in the field of hacking) in defensive hacking you need to learn networking and all and you have to make sure that the company f...

Hacking Instagram Using Bruteforce

Hacking Instagram Using Bruteforce Attack so today we will see how can we hack into anyone instagram account so before starting let me tell you that you can also watch video on the same by clicking here on youtube  there everything is explained same as here so lets start. Requirements: PC or Laptop Internet connection kali os or virtual kali a victim in which you will perform hack Steps: first we will open our kali machines terminal and check if you are root or not by typing whoami if it says root then you don't have to follow next step type sudo su and after pressing enter type the password of your kali machine after this type apt-get install tor After the installation complete go to this link  and click on clone or download and copy the text Return to your terminal again and type git clone and then paste the text you just copied After that give time for downloading and when it completes type chmod +x install.sh After this type chmod +x instashell....

Keylogger using Python

Create Remote KeyLogger using Python hello everyone we are back with new python program in which we are going to create a remote keylogger for this first we must have to learn what is KeyLogger.  KeyLogger: so KeyLogger is a simple software which store every keystrokes by you and store it somewhere and you can access it later anytime when you want to see which key you typed. Remote KeyLogger: The only difference between remote keylogger and the keylogger is that user can access the keystrokes only in the same system where the program is running in normal keylogger but in remote keylogger an additional feature is that you can or anyone can access the keystrokes from anywhere. what remote keylogger actually do is it send the keystrokes file on the server from where anyone can access the keystrokes who has access to the server. for the video explanation and practical view of how actually a remote keylogger works that we will create on our next blog you...