{"id":8479,"date":"2023-01-13T09:43:02","date_gmt":"2023-01-13T09:43:02","guid":{"rendered":"https:\/\/reconcybersecurity.com\/?p=8479"},"modified":"2023-04-16T08:58:53","modified_gmt":"2023-04-16T08:58:53","slug":"keep-covert-messages-inside-audio-and-picture-files-cyber-security-recon-cyber-security","status":"publish","type":"post","link":"https:\/\/reconcybersecurity.com\/blogs\/keep-covert-messages-inside-audio-and-picture-files-cyber-security-recon-cyber-security\/","title":{"rendered":"Keep Covert Messages inside Audio and Picture Files | Cyber security | RECON CYBER SECURITY"},"content":{"rendered":"\n<p class=\"has-black-color has-text-color has-medium-font-size\"><strong><a href=\"https:\/\/reconcybersecurity.com\/\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#ff0000\" class=\"has-inline-color\">Greetings Hackers!<\/mark><\/a><\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\"><br>We are here to discover the world of <a href=\"https:\/\/reconcybersecurity.com\/blog\/\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-amber-color\">Cybersecurity Blogs<\/mark><\/strong><\/a>, in this case, how to hide messages within Audio and Image files. Not only is this trick simple, but it can also come in handy for a variety of uses; for instance, sending sensitive data securely without anyone else being able to access it, using it in Capture the Flag competitions, or when you need to talk to your significant other without your parents snooping.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-black-color has-text-color has-large-font-size\">Embed Messages in an Audio File<\/p>\n<\/blockquote>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">To conceal messages within Audio files, we need software known as &#8220;<strong>Hiddenwave<\/strong>&#8221; which can be found on GitHub and can easily be downloaded.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/1-4.png\" alt=\"\" class=\"wp-image-8480\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/2-5.png\" alt=\"\" class=\"wp-image-8481\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">To embed a message and crack the message using <a href=\"https:\/\/reconcybersecurity.com\/python-programming-course\/\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-green-cyan-color\">Python scripts<\/mark><\/strong><\/a>, the very first requirement is a &#8220;.wav&#8221; file (a type of audio file).<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/3-3.png\" alt=\"\" class=\"wp-image-8482\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">The instruction to encode messages inside an Audio file is<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/4-2.png\" alt=\"\" class=\"wp-image-8483\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/5-2.png\" alt=\"\" class=\"wp-image-8485\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">I have obtained the output file (vulndetox.wav) and will be sharing it with anyone through social media platforms like <strong><a href=\"https:\/\/reconcybersecurity.com\/how-to-hack-whatsapp-with-qr-code-hacking-2022-n4h\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">WhatsApp or through e-mail<\/mark><\/a><\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/6-2.png\" alt=\"\" class=\"wp-image-8486\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">Now the second person will download the file and, by using another Python script named &#8220;ExWave.py&#8221;, extract the secret message hidden inside.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/7-2.png\" alt=\"\" class=\"wp-image-8487\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/8-3.png\" alt=\"\" class=\"wp-image-8488\" width=\"800\" height=\"76\"\/><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-black-color has-text-color has-large-font-size\">Embed Messages in an Image File<\/p>\n<\/blockquote>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">To learn how to conceal messages in an Image file, we must first understand what is known as \u201c<em>EXIF data<\/em>\u201d. This information includes things such as camera type, pixel size, file name, and various other facts. We can hide our comment data within this EXIF data by downloading the aptly named tool, &#8220;<strong>ExifTool<\/strong>&#8220;.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/9-2.png\" alt=\"\" class=\"wp-image-8489\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/10-2.png\" alt=\"\" class=\"wp-image-8491\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">Once it is set up, you can simply execute it by typing \u201c<em>ExifTool<\/em>\u201d in your terminal.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/11-1.png\" alt=\"\" class=\"wp-image-8492\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/12-2.png\" alt=\"\" class=\"wp-image-8493\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">Instead of &#8220;Comment&#8221;, any value of your choosing can be utilized to bring forth the concealed meaning of this message when sent to a different individual.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/13-1.png\" alt=\"\" class=\"wp-image-8494\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">I have transmitted this via <em>Whatsapp<\/em>, however, you may use any other method you desire. Be aware that, with certain apps, sensitive EXIF data such as location could be eliminated. After it is downloaded, he will be able to extract the data by utilizing ExifTool.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/14-1.png\" alt=\"\" class=\"wp-image-8495\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/15-1.png\" alt=\"\" class=\"wp-image-8496\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">You have effectively embedded the picture in the image file.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/01\/16-1.png\" alt=\"\" class=\"wp-image-8497\"\/><\/figure>\n\n\n\n<p class=\"has-white-color has-text-color has-x-large-font-size\"><a href=\"https:\/\/reconcybersecurity.com\/blog\/\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#ff0101\" class=\"has-inline-color\">Today is done, let&#8217;s see each other in my next blog post!<\/mark><\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"Greetings Hackers! We are here to discover the world of Cybersecurity Blogs, in this case, how to hide&hellip;\n","protected":false},"author":1,"featured_media":10760,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[10,55],"tags":[240,372,373,374,375,376,377,378,379,380,381,90,56,311,57],"class_list":{"0":"post-8479","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-hacking","8":"category-hacking-tools","9":"tag-cyber-security","10":"tag-encode-audio","11":"tag-encode-in-audio","12":"tag-encode-in-photo","13":"tag-encode-in-picture","14":"tag-encode-photo","15":"tag-encoder","16":"tag-encrypt-audio","17":"tag-encrypt-photo","18":"tag-encrypt-picture","19":"tag-hidden-message","20":"tag-how-to-use-metasploit","21":"tag-phishing-tool","22":"tag-recon-cyber-security","23":"tag-social-media-hacking"},"_links":{"self":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/8479","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/comments?post=8479"}],"version-history":[{"count":2,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/8479\/revisions"}],"predecessor-version":[{"id":10958,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/8479\/revisions\/10958"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media\/10760"}],"wp:attachment":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media?parent=8479"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/categories?post=8479"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/tags?post=8479"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}