Skip to playerSkip to main content
This video exposes how a malicious image can be used in attacks and — most importantly — how to protect yourself. We explain image-based vulnerabilities at a high level, show a safe demo inside a controlled lab environment, and share practical defensive steps for everyday users and sysadmins.

Why watch:

Understand how seemingly harmless files can pose risks.

Learn detection and prevention tips you can use right away.

Demo is performed in a sandbox — do not attempt this on personal machines.

Important — Safety & Ethics:
This content is for educational and defensive purposes only. Do not try to replicate the demo on your personal device. If you are a security researcher, always use isolated lab environments.

Follow Me:
https://linktree.com/syedmhatim

Subscribe / More:
If you found this useful, LIKE, SUBSCRIBE, and hit the bell for more cybersecurity explainers.

#cybersecurity #malicious #pcsecurity #ethicalhacking #image

This Image Can Hack Your PC — Malicious Image Explained (Safe Demo)

Category

🤖
Tech
Transcript
00:00What kind of image can you give an access to a hacker?
00:07So, I will tell you,
00:09what kind of image can you find in the back end
00:11an exit file or malicious payload bind?
00:13so that you can hack your device.
00:15But if you haven't subscribed yet, subscribe and like it.
00:18So, first of all, I have an image.
00:21Here is an exit file.
00:23I have a software file.
00:25Here is a malicious file.
00:27.exe file.
00:28.bad file.
00:29.idk
00:30Mechanic file.
00:31.dk
00:31osc Popo
00:34.dk
00:36.dk
00:37I don't like you so,
00:38.dk
00:40.ik
00:42.un
00:51.what
00:55e
00:58After this we are going to create SFX Archive
01:01We are going to go to advance
01:03Here we are going to SFX option
01:05Here we are going to run after extension
01:08First of all, we are going to image
01:10Our image is test.jpg
01:12My jpg file is here
01:14And our payload file is here
01:16For example, I have an exe file
01:18Mine.exe file
01:19After we go to modes
01:20After we go to hide down
01:22After we go to hide down
01:23After we go to unpack to temporary folder
01:25Click on logo and icon
01:27I have a use of icon
01:29I have a convert file
01:30I have a convert file
01:31I have a load file
01:33So here we are load
01:34Then we have our exe file
01:35This is our load
01:36This is our load
01:37Then we go to the general
01:39And here I have type
01:40This type
01:41And then we have a
01:43Here we have a image
01:45Here we have a image
01:47This is a image file
01:48Here we have a image file
01:49I have open
01:51This is a software
01:54I am using a user account control setting on.
01:57If you have something like this, you can use this option.
02:03If you have a payload, you can run.
02:06All the hacker has a way to run.
02:08Now, I will use the view.
02:10If you have a file name extension.
02:12If you have a file name extension, you can show it.
02:15Then, you can know that this is a file file or a jpg file.
02:18So, you can do it.
02:20option
02:25ognitory
02:27high
02:32име
02:35unlike
02:38sc
02:41they
02:42converge
02:43on
02:44too
02:46If you have a SCR extension, you can send a non-numper to anyone, so it won't open it.
02:51If I open it, our image will open it here, and the payload will be here.
02:55Now, which method is which we can put in a PNG file or JPG file?
03:00We call it PNG-JPG file, but in the backend there is a payload bind, which can give a device to a hacker.
03:07So, the method is which way?
03:08Right-click, right-click, right-click, right-click, right-click, right-click, right-click, right-click, right-click.
03:11Now, I'm going to click on PNG file, so that the victim can put in a PNG file, so that I will type in PNG.
03:17So, I have a type in PNG, and I have a PNG file now.
03:21Now, after PNG, I'm going to click on PNG, right-click, right-click, and insert unique code control character.
03:26And then I will click on star, right-to-left, override.
03:29Now, I'm going to click on enter, then refresh.
03:32After, we have an extension, but this is an XZ file, which is a image behind.
03:38Now, when, the output is
04:05I will recommend you to never notify me when I try to install and click on it.
04:13There are other options here.
04:15Go to view and go to the file name and go to your own.
04:18Your windows system and your defender will be on.
04:22This way you can use malicious files.
04:25This was for today's video.
04:27Subscribe to your channel.
Be the first to comment
Add your comment

Recommended