If I know the CPU architecture of a target, can I send instructions embedded in an image?

The name of the pictureThe name of the pictureThe name of the pictureClash Royale CLAN TAG#URR8PPP











up vote
1
down vote

favorite












This question can be hard to ask (not sure), but it's very simple:



Can I send instructions embedded in an image to a target, if I know his CPU architecture?



Thanks!










share|improve this question







New contributor




Faminha102 is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.























    up vote
    1
    down vote

    favorite












    This question can be hard to ask (not sure), but it's very simple:



    Can I send instructions embedded in an image to a target, if I know his CPU architecture?



    Thanks!










    share|improve this question







    New contributor




    Faminha102 is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
    Check out our Code of Conduct.





















      up vote
      1
      down vote

      favorite









      up vote
      1
      down vote

      favorite











      This question can be hard to ask (not sure), but it's very simple:



      Can I send instructions embedded in an image to a target, if I know his CPU architecture?



      Thanks!










      share|improve this question







      New contributor




      Faminha102 is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.











      This question can be hard to ask (not sure), but it's very simple:



      Can I send instructions embedded in an image to a target, if I know his CPU architecture?



      Thanks!







      architecture image cpu






      share|improve this question







      New contributor




      Faminha102 is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.











      share|improve this question







      New contributor




      Faminha102 is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.









      share|improve this question




      share|improve this question






      New contributor




      Faminha102 is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.









      asked 3 hours ago









      Faminha102

      61




      61




      New contributor




      Faminha102 is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.





      New contributor





      Faminha102 is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.






      Faminha102 is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.




















          3 Answers
          3






          active

          oldest

          votes

















          up vote
          1
          down vote













          Can you send them? Yes, of course. Just assemble them and stick them somewhere in the image file.



          Will the target execute them? No, not unless you already have control over the target (and can thus put a program there to read and execute them), or you find some exploit in an image viewer and get the image to load in it.






          share|improve this answer




















          • Shouldn't the CPU execute the instructions by only opening the image?
            – Faminha102
            3 hours ago










          • No, why would it?
            – Joseph Sible
            3 hours ago










          • Because the CPU would have to process that information, from what I understand.
            – Faminha102
            3 hours ago










          • Processing bytes of data is different than executing those bytes. One doesn't imply the other.
            – Joseph Sible
            3 hours ago










          • Isn't everything bytes in the end?
            – Faminha102
            3 hours ago

















          up vote
          1
          down vote













          No. Image files such as JPEG files don't execute code, they are simply rendered and displayed.



          If you want to hide some information in a file that's called Steganography, but that only hides information, it doesn't execute any instructions.



          For a file to run code it has to be an executable, or be run by another program which reads the file, then executes the commands in the file.



          In this case the rare instance when an image could result in executing code is if there were a bug in the software which rendered the image based off the file. This has happened in the past, but it's exceedingly rare. For all practical purposes an image can't run instructions.



          This of course isn't the case for PDFs, Adobe Flash, etc.






          share|improve this answer




















          • Interesting. So with PDFs this would ok, that's what you are saying?
            – Faminha102
            3 hours ago










          • PDFs have more functionality, they can be interactive, load external resources, embed other files, etc. They aren't as dangerous as Word/Execl files though.
            – Daisetsu
            3 hours ago










          • Could you elaborate more?
            – Faminha102
            3 hours ago










          • Elaborate more on what? A trojan horse style attack relies on an innocent looking file which either contains a malicious payload (word macros, executable files, javascript) OR is read by a vulnerable parser. This second case is pretty rare, and gets a lot of attention because it would effect so many people. There's one example you're probably familiar with, which is Flash. Flash has constant security updates, because it tries to do so much, there's a lot of ways to craft a file which results in (sometimes) arbitrary code execution.
            – Daisetsu
            3 hours ago

















          up vote
          0
          down vote













          Not sure if you mean Image as in photo? or OS?






          share|improve this answer








          New contributor




          Robert Joodat is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
          Check out our Code of Conduct.

















            Your Answer







            StackExchange.ready(function()
            var channelOptions =
            tags: "".split(" "),
            id: "162"
            ;
            initTagRenderer("".split(" "), "".split(" "), channelOptions);

            StackExchange.using("externalEditor", function()
            // Have to fire editor after snippets, if snippets enabled
            if (StackExchange.settings.snippets.snippetsEnabled)
            StackExchange.using("snippets", function()
            createEditor();
            );

            else
            createEditor();

            );

            function createEditor()
            StackExchange.prepareEditor(
            heartbeatType: 'answer',
            convertImagesToLinks: false,
            noModals: false,
            showLowRepImageUploadWarning: true,
            reputationToPostImages: null,
            bindNavPrevention: true,
            postfix: "",
            noCode: true, onDemand: true,
            discardSelector: ".discard-answer"
            ,immediatelyShowMarkdownHelp:true
            );



            );






            Faminha102 is a new contributor. Be nice, and check out our Code of Conduct.









             

            draft saved


            draft discarded


















            StackExchange.ready(
            function ()
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsecurity.stackexchange.com%2fquestions%2f196591%2fif-i-know-the-cpu-architecture-of-a-target-can-i-send-instructions-embedded-in%23new-answer', 'question_page');

            );

            Post as a guest






























            3 Answers
            3






            active

            oldest

            votes








            3 Answers
            3






            active

            oldest

            votes









            active

            oldest

            votes






            active

            oldest

            votes








            up vote
            1
            down vote













            Can you send them? Yes, of course. Just assemble them and stick them somewhere in the image file.



            Will the target execute them? No, not unless you already have control over the target (and can thus put a program there to read and execute them), or you find some exploit in an image viewer and get the image to load in it.






            share|improve this answer




















            • Shouldn't the CPU execute the instructions by only opening the image?
              – Faminha102
              3 hours ago










            • No, why would it?
              – Joseph Sible
              3 hours ago










            • Because the CPU would have to process that information, from what I understand.
              – Faminha102
              3 hours ago










            • Processing bytes of data is different than executing those bytes. One doesn't imply the other.
              – Joseph Sible
              3 hours ago










            • Isn't everything bytes in the end?
              – Faminha102
              3 hours ago














            up vote
            1
            down vote













            Can you send them? Yes, of course. Just assemble them and stick them somewhere in the image file.



            Will the target execute them? No, not unless you already have control over the target (and can thus put a program there to read and execute them), or you find some exploit in an image viewer and get the image to load in it.






            share|improve this answer




















            • Shouldn't the CPU execute the instructions by only opening the image?
              – Faminha102
              3 hours ago










            • No, why would it?
              – Joseph Sible
              3 hours ago










            • Because the CPU would have to process that information, from what I understand.
              – Faminha102
              3 hours ago










            • Processing bytes of data is different than executing those bytes. One doesn't imply the other.
              – Joseph Sible
              3 hours ago










            • Isn't everything bytes in the end?
              – Faminha102
              3 hours ago












            up vote
            1
            down vote










            up vote
            1
            down vote









            Can you send them? Yes, of course. Just assemble them and stick them somewhere in the image file.



            Will the target execute them? No, not unless you already have control over the target (and can thus put a program there to read and execute them), or you find some exploit in an image viewer and get the image to load in it.






            share|improve this answer












            Can you send them? Yes, of course. Just assemble them and stick them somewhere in the image file.



            Will the target execute them? No, not unless you already have control over the target (and can thus put a program there to read and execute them), or you find some exploit in an image viewer and get the image to load in it.







            share|improve this answer












            share|improve this answer



            share|improve this answer










            answered 3 hours ago









            Joseph Sible

            521210




            521210











            • Shouldn't the CPU execute the instructions by only opening the image?
              – Faminha102
              3 hours ago










            • No, why would it?
              – Joseph Sible
              3 hours ago










            • Because the CPU would have to process that information, from what I understand.
              – Faminha102
              3 hours ago










            • Processing bytes of data is different than executing those bytes. One doesn't imply the other.
              – Joseph Sible
              3 hours ago










            • Isn't everything bytes in the end?
              – Faminha102
              3 hours ago
















            • Shouldn't the CPU execute the instructions by only opening the image?
              – Faminha102
              3 hours ago










            • No, why would it?
              – Joseph Sible
              3 hours ago










            • Because the CPU would have to process that information, from what I understand.
              – Faminha102
              3 hours ago










            • Processing bytes of data is different than executing those bytes. One doesn't imply the other.
              – Joseph Sible
              3 hours ago










            • Isn't everything bytes in the end?
              – Faminha102
              3 hours ago















            Shouldn't the CPU execute the instructions by only opening the image?
            – Faminha102
            3 hours ago




            Shouldn't the CPU execute the instructions by only opening the image?
            – Faminha102
            3 hours ago












            No, why would it?
            – Joseph Sible
            3 hours ago




            No, why would it?
            – Joseph Sible
            3 hours ago












            Because the CPU would have to process that information, from what I understand.
            – Faminha102
            3 hours ago




            Because the CPU would have to process that information, from what I understand.
            – Faminha102
            3 hours ago












            Processing bytes of data is different than executing those bytes. One doesn't imply the other.
            – Joseph Sible
            3 hours ago




            Processing bytes of data is different than executing those bytes. One doesn't imply the other.
            – Joseph Sible
            3 hours ago












            Isn't everything bytes in the end?
            – Faminha102
            3 hours ago




            Isn't everything bytes in the end?
            – Faminha102
            3 hours ago












            up vote
            1
            down vote













            No. Image files such as JPEG files don't execute code, they are simply rendered and displayed.



            If you want to hide some information in a file that's called Steganography, but that only hides information, it doesn't execute any instructions.



            For a file to run code it has to be an executable, or be run by another program which reads the file, then executes the commands in the file.



            In this case the rare instance when an image could result in executing code is if there were a bug in the software which rendered the image based off the file. This has happened in the past, but it's exceedingly rare. For all practical purposes an image can't run instructions.



            This of course isn't the case for PDFs, Adobe Flash, etc.






            share|improve this answer




















            • Interesting. So with PDFs this would ok, that's what you are saying?
              – Faminha102
              3 hours ago










            • PDFs have more functionality, they can be interactive, load external resources, embed other files, etc. They aren't as dangerous as Word/Execl files though.
              – Daisetsu
              3 hours ago










            • Could you elaborate more?
              – Faminha102
              3 hours ago










            • Elaborate more on what? A trojan horse style attack relies on an innocent looking file which either contains a malicious payload (word macros, executable files, javascript) OR is read by a vulnerable parser. This second case is pretty rare, and gets a lot of attention because it would effect so many people. There's one example you're probably familiar with, which is Flash. Flash has constant security updates, because it tries to do so much, there's a lot of ways to craft a file which results in (sometimes) arbitrary code execution.
              – Daisetsu
              3 hours ago














            up vote
            1
            down vote













            No. Image files such as JPEG files don't execute code, they are simply rendered and displayed.



            If you want to hide some information in a file that's called Steganography, but that only hides information, it doesn't execute any instructions.



            For a file to run code it has to be an executable, or be run by another program which reads the file, then executes the commands in the file.



            In this case the rare instance when an image could result in executing code is if there were a bug in the software which rendered the image based off the file. This has happened in the past, but it's exceedingly rare. For all practical purposes an image can't run instructions.



            This of course isn't the case for PDFs, Adobe Flash, etc.






            share|improve this answer




















            • Interesting. So with PDFs this would ok, that's what you are saying?
              – Faminha102
              3 hours ago










            • PDFs have more functionality, they can be interactive, load external resources, embed other files, etc. They aren't as dangerous as Word/Execl files though.
              – Daisetsu
              3 hours ago










            • Could you elaborate more?
              – Faminha102
              3 hours ago










            • Elaborate more on what? A trojan horse style attack relies on an innocent looking file which either contains a malicious payload (word macros, executable files, javascript) OR is read by a vulnerable parser. This second case is pretty rare, and gets a lot of attention because it would effect so many people. There's one example you're probably familiar with, which is Flash. Flash has constant security updates, because it tries to do so much, there's a lot of ways to craft a file which results in (sometimes) arbitrary code execution.
              – Daisetsu
              3 hours ago












            up vote
            1
            down vote










            up vote
            1
            down vote









            No. Image files such as JPEG files don't execute code, they are simply rendered and displayed.



            If you want to hide some information in a file that's called Steganography, but that only hides information, it doesn't execute any instructions.



            For a file to run code it has to be an executable, or be run by another program which reads the file, then executes the commands in the file.



            In this case the rare instance when an image could result in executing code is if there were a bug in the software which rendered the image based off the file. This has happened in the past, but it's exceedingly rare. For all practical purposes an image can't run instructions.



            This of course isn't the case for PDFs, Adobe Flash, etc.






            share|improve this answer












            No. Image files such as JPEG files don't execute code, they are simply rendered and displayed.



            If you want to hide some information in a file that's called Steganography, but that only hides information, it doesn't execute any instructions.



            For a file to run code it has to be an executable, or be run by another program which reads the file, then executes the commands in the file.



            In this case the rare instance when an image could result in executing code is if there were a bug in the software which rendered the image based off the file. This has happened in the past, but it's exceedingly rare. For all practical purposes an image can't run instructions.



            This of course isn't the case for PDFs, Adobe Flash, etc.







            share|improve this answer












            share|improve this answer



            share|improve this answer










            answered 3 hours ago









            Daisetsu

            2,746516




            2,746516











            • Interesting. So with PDFs this would ok, that's what you are saying?
              – Faminha102
              3 hours ago










            • PDFs have more functionality, they can be interactive, load external resources, embed other files, etc. They aren't as dangerous as Word/Execl files though.
              – Daisetsu
              3 hours ago










            • Could you elaborate more?
              – Faminha102
              3 hours ago










            • Elaborate more on what? A trojan horse style attack relies on an innocent looking file which either contains a malicious payload (word macros, executable files, javascript) OR is read by a vulnerable parser. This second case is pretty rare, and gets a lot of attention because it would effect so many people. There's one example you're probably familiar with, which is Flash. Flash has constant security updates, because it tries to do so much, there's a lot of ways to craft a file which results in (sometimes) arbitrary code execution.
              – Daisetsu
              3 hours ago
















            • Interesting. So with PDFs this would ok, that's what you are saying?
              – Faminha102
              3 hours ago










            • PDFs have more functionality, they can be interactive, load external resources, embed other files, etc. They aren't as dangerous as Word/Execl files though.
              – Daisetsu
              3 hours ago










            • Could you elaborate more?
              – Faminha102
              3 hours ago










            • Elaborate more on what? A trojan horse style attack relies on an innocent looking file which either contains a malicious payload (word macros, executable files, javascript) OR is read by a vulnerable parser. This second case is pretty rare, and gets a lot of attention because it would effect so many people. There's one example you're probably familiar with, which is Flash. Flash has constant security updates, because it tries to do so much, there's a lot of ways to craft a file which results in (sometimes) arbitrary code execution.
              – Daisetsu
              3 hours ago















            Interesting. So with PDFs this would ok, that's what you are saying?
            – Faminha102
            3 hours ago




            Interesting. So with PDFs this would ok, that's what you are saying?
            – Faminha102
            3 hours ago












            PDFs have more functionality, they can be interactive, load external resources, embed other files, etc. They aren't as dangerous as Word/Execl files though.
            – Daisetsu
            3 hours ago




            PDFs have more functionality, they can be interactive, load external resources, embed other files, etc. They aren't as dangerous as Word/Execl files though.
            – Daisetsu
            3 hours ago












            Could you elaborate more?
            – Faminha102
            3 hours ago




            Could you elaborate more?
            – Faminha102
            3 hours ago












            Elaborate more on what? A trojan horse style attack relies on an innocent looking file which either contains a malicious payload (word macros, executable files, javascript) OR is read by a vulnerable parser. This second case is pretty rare, and gets a lot of attention because it would effect so many people. There's one example you're probably familiar with, which is Flash. Flash has constant security updates, because it tries to do so much, there's a lot of ways to craft a file which results in (sometimes) arbitrary code execution.
            – Daisetsu
            3 hours ago




            Elaborate more on what? A trojan horse style attack relies on an innocent looking file which either contains a malicious payload (word macros, executable files, javascript) OR is read by a vulnerable parser. This second case is pretty rare, and gets a lot of attention because it would effect so many people. There's one example you're probably familiar with, which is Flash. Flash has constant security updates, because it tries to do so much, there's a lot of ways to craft a file which results in (sometimes) arbitrary code execution.
            – Daisetsu
            3 hours ago










            up vote
            0
            down vote













            Not sure if you mean Image as in photo? or OS?






            share|improve this answer








            New contributor




            Robert Joodat is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
            Check out our Code of Conduct.





















              up vote
              0
              down vote













              Not sure if you mean Image as in photo? or OS?






              share|improve this answer








              New contributor




              Robert Joodat is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
              Check out our Code of Conduct.



















                up vote
                0
                down vote










                up vote
                0
                down vote









                Not sure if you mean Image as in photo? or OS?






                share|improve this answer








                New contributor




                Robert Joodat is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                Check out our Code of Conduct.









                Not sure if you mean Image as in photo? or OS?







                share|improve this answer








                New contributor




                Robert Joodat is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                Check out our Code of Conduct.









                share|improve this answer



                share|improve this answer






                New contributor




                Robert Joodat is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                Check out our Code of Conduct.









                answered 2 hours ago









                Robert Joodat

                11




                11




                New contributor




                Robert Joodat is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                Check out our Code of Conduct.





                New contributor





                Robert Joodat is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                Check out our Code of Conduct.






                Robert Joodat is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                Check out our Code of Conduct.




















                    Faminha102 is a new contributor. Be nice, and check out our Code of Conduct.









                     

                    draft saved


                    draft discarded


















                    Faminha102 is a new contributor. Be nice, and check out our Code of Conduct.












                    Faminha102 is a new contributor. Be nice, and check out our Code of Conduct.











                    Faminha102 is a new contributor. Be nice, and check out our Code of Conduct.













                     


                    draft saved


                    draft discarded














                    StackExchange.ready(
                    function ()
                    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsecurity.stackexchange.com%2fquestions%2f196591%2fif-i-know-the-cpu-architecture-of-a-target-can-i-send-instructions-embedded-in%23new-answer', 'question_page');

                    );

                    Post as a guest













































































                    Comments

                    Popular posts from this blog

                    What does second last employer means? [closed]

                    Installing NextGIS Connect into QGIS 3?

                    One-line joke