All I wanted for Christmas..

For beginners, flames not allowed...(just by the staff :P)
Locked
User avatar
Dave999
Newbie
Newbie
Posts: 2
Joined: 26 Dec 2008, 17:00
15

All I wanted for Christmas..

Post by Dave999 »

Hello,

Newbie here so this is me....

My 1st Pc was made by Radio Shack... Had no hard drive
and output was to a tv. The good old days..

My 1st real computer was made by IBM and had a 5 1/4
drive and also had no HD.. But they were available to the
elite..

Never got into programming except for dos basic language
but that's where everything started..

So for Christmas all I wanted was a way to hide an exe file
in a jpg, pdg, doc, swf, mov, avi or any like program so I
could give my kids a good present. Must exe the exe file
on loading picture or other file type.

While Binders are great, none I have found so far will allow
an exe file to load in the background..

I don't want anyone to do this for me, but I'm looking for
ideas or even things that are known not to work..

I thought there was hope when I got this program fecovil v1.0
that said it would bind exe to jpg file and run exe but that little
program seems not to even load and I got it from 10 places and
all did not run..

So, if you have ideas, let me know.. I'm going in circles here..


Thanks and Happy Holidays to you all..

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Post by DNR »

happy holidays newbie.

DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

ebrizzlez
Kage
Kage
Posts: 732
Joined: 31 Mar 2007, 16:00
17
Location: Hidden in a Buffer Protection.
Contact:

Post by ebrizzlez »

Freshbind which is available in our downloads section can bind an executable file with any other file. :wink:

Why don't you find the sticky Introduce Yourself! in the General Discussion board and introduce yourself. :wink:
[img]http://i81.photobucket.com/albums/j205/ebrizzlez/4lsint1.jpg[/img]

rhysh
Fame ! Where are the chicks?!
Fame ! Where are the chicks?!
Posts: 767
Joined: 15 Nov 2006, 17:00
17
Contact:

Post by rhysh »

i dnt think its possible to bind a exe to a jpg,it will be the jpg in the exe

User avatar
JuggaloMushroom
Fame ! Where are the chicks?!
Fame ! Where are the chicks?!
Posts: 252
Joined: 18 Jul 2006, 16:00
17
Contact:

Post by JuggaloMushroom »

rhysh wrote:i dnt think its possible to bind a exe to a jpg,it will be the jpg in the exe
I am sorry I can't understand that sentence, did you use not and possible in the same sentence? maybe that's why.
Any way, binders, they work fine, you just need to learn to use em.

ebrizzlez
Kage
Kage
Posts: 732
Joined: 31 Mar 2007, 16:00
17
Location: Hidden in a Buffer Protection.
Contact:

Post by ebrizzlez »

ryhs meant that when you bind a .jpg file with an executable, the resulting file would be an executable. This statement is correct, because a binder has to get executed, image files are viewed, so they would never technically get executed by the operating system.

Binders use a stub to locate the binded files and it executes those binded files. So by default .jpg would be open with M$ Imager Viewer and the executable or malware binded would be executed by the operating system, running the malicious code and infecting the user.

Code: Select all

Binded Files
__________

1.Pretty.jpg ------            ------ View Image
                      |  stub   |
2.Trojan.exe===  xxxx> Binded.exe -- Run Malicous Code
                      |            |
3.Program.exe~~             ------- Run regular application.
I know its a poorly drawn image. But some people learn better visually.

No matter what we bind, the resulting file would be an executable(.exe) because we need the stub to execute each of the files. So a .jpg+.jgp = .exe

Now lets assume that the binder binds the files and executes them in the order they are binded. The first half of memory of the binded file would display the image Pretty.jpg, and in most cases the operating system would use the default program to open up Pretty.jpg . Since we loaded pretty.jpg into the default program, it could notice that its referencing back to an executable which is a dangerous and allows easier detection. Thats why I don't recommend binding to a .jpg .

Next we execute the malicious code and the user is now infected with our malware.

And finally. We run the regular program, I recommend binding with an installer or a regular application because it would look suspicious for a executable to just display a image with the default program.. thats just a give away. :roll:
[img]http://i81.photobucket.com/albums/j205/ebrizzlez/4lsint1.jpg[/img]

User avatar
Dave999
Newbie
Newbie
Posts: 2
Joined: 26 Dec 2008, 17:00
15

Post by Dave999 »

ebrizzlez wrote: I recommend binding with an installer or a regular application because it would look suspicious for a executable to just display a image with the default program.. thats just a give away. :roll:
Thanks for reminding me of that.. Sometimes I overthink things
and forget the basics..

rhysh
Fame ! Where are the chicks?!
Fame ! Where are the chicks?!
Posts: 767
Joined: 15 Nov 2006, 17:00
17
Contact:

Post by rhysh »

ebriz read me right

you cant just open a picture and expect an exe to open as well...and hence if u could,scammers wouldnt ask you to download that virus.com file would they?instead theyd say check out her hot pussy at imageshack.us/myimage.php?image=4tnpussy.jpg

anyways

ebrizzlez
Kage
Kage
Posts: 732
Joined: 31 Mar 2007, 16:00
17
Location: Hidden in a Buffer Protection.
Contact:

Post by ebrizzlez »

rhysh wrote:ebriz read me right

you cant just open a picture and expect an exe to open as well...and hence if u could,scammers wouldnt ask you to download that virus.com file would they?instead theyd say check out her hot pussy at imageshack.us/myimage.php?image=4tnpussy.jpg

anyways
Their are web exploits that use remote url's to run a local buffer overflow on a system and take root of the system because of the webbrowser hasn't been updated. Their is also the infamous wmf exploit and hence never forget the JpegOfDeath exploit. :wink:

Rooting your target to set a backdoor for later hacks is the key to every hack. :twisted:
[img]http://i81.photobucket.com/albums/j205/ebrizzlez/4lsint1.jpg[/img]

User avatar
s0lid_sn4k3
Newbie
Newbie
Posts: 4
Joined: 19 Feb 2009, 17:00
15

Post by s0lid_sn4k3 »

Yes it is possible to execute a program as a jpg with this evil program shown below:

Image

I don't know if I'm allowed to share it on here with you guys. Because your AV will detect this as malware for sure, just so you know.

The trick here is to send the victim the shortcut AND the jpg....but now i have said too much...

ebrizzlez
Kage
Kage
Posts: 732
Joined: 31 Mar 2007, 16:00
17
Location: Hidden in a Buffer Protection.
Contact:

Post by ebrizzlez »

This topic is old, check the date.

Please don't reopen old topics. :wink:

This topic will be locked, but please feel free to post a new topic about your program if you would like . :lol:
[img]http://i81.photobucket.com/albums/j205/ebrizzlez/4lsint1.jpg[/img]

Locked