Abstract:
In this article, I will be discussing the security vulnerabilities that could be found using images. Furthermore, I will be demonstrating how an attacker can steal confidential images/data and may gain access to the host machine. What are the initial things that a hacker look for when trying to…