Hide your files like a hacker (5 Ways)
Based on NetworkChuck's video on YouTube. If you like this content, support the original creators by watching, liking and subscribing to their content.
Windows hidden attributes remove files from normal Explorer views until hidden items are enabled in folder options.
Briefing
Hiding files on a computer ranges from simple “invisible” settings to techniques that bury data inside other files or inside encrypted, nested containers. The core takeaway is that every method has a tell—whether it’s a filename quirk, a filesystem feature like NTFS alternate data streams, an unexpected file size, or subtle forensic traces—so the same playbook used to conceal data can also be used to detect it.
The easiest approach is Windows hidden attributes. A file can be made disappear by enabling the “Hidden” checkbox in Properties; it won’t show up until “Show hidden files, folders, and drives” is turned back on. The transcript also demonstrates a more deceptive variant: renaming a folder to an effectively blank name using an ALT code (ALT 255) and swapping the folder icon to a blank one. The folder still exists and can be opened, but it looks empty or unnamed in normal browsing—an effect that works partly because many admins leave hidden-file visibility off by default.
On Linux and macOS, the hiding mechanism shifts to naming conventions. Prefixing a filename with a dot (e.g., renaming to “.something”) makes it invisible to standard directory listings; using `ls -a` reveals it. From there, misdirection escalates: renaming a file so its extension doesn’t match its real content can confuse users and apps. The transcript gives examples like renaming a file to “.txt” when it isn’t truly a text file, and even wrapping data in a ZIP and renaming it to “.pdf” to further throw off casual inspection.
The most technically distinctive method is Windows NTFS Alternate Data Streams (ADS). ADS lets extra data be stored inside a file without changing the file’s visible size or primary content. The demonstration shows a “nothing to see here” file that still appears normal in Properties, while the hidden payload is accessed only by referencing the stream using a colon syntax (e.g., `filename:streamname`). This can be paired with deletion of the original payload file after embedding, leaving only the carrier file.
For stronger concealment, the transcript moves to encrypted hidden containers using VeraCrypt. A hidden volume sits inside an outer encrypted volume (“inception”), with separate passwords. If someone forces the outer password, the system can reveal a decoy—while the real data remains inaccessible without the hidden-volume password. The workflow includes creating the outer container, then creating a hidden volume inside it, and mounting either layer depending on which password is provided.
Finally, steganography hides data in media using least significant bit (LSB) changes so modifications are imperceptible. The transcript uses StagHide (installed via WSL on Windows) to embed a small “secret diary” file inside an image and then inside a WAV audio file. Extraction requires the same password, and the carrier file can be deleted afterward because the payload is embedded.
To reverse these tricks, detection methods mirror the hiding methods: enable hidden-file visibility and use scripts to enumerate hidden items; use file-signature checks to catch mismatched extensions; reveal ADS with `dir /r`; look for suspicious size anomalies to flag encrypted containers; and use steganalysis tools like “stag detect” to search for traces in images and audio. The transcript concludes that combining multiple layers—renaming, ADS, steganography, and nested encryption—dramatically increases difficulty for anyone trying to find the “secret diary.”
Cornell Notes
The transcript lays out five ways to hide files on Windows, macOS, and Linux, from basic “hidden” attributes to advanced concealment. It shows how Windows NTFS Alternate Data Streams can store extra data inside an ordinary file without changing its visible size, and how VeraCrypt hidden volumes can create nested encrypted containers with separate passwords for decoy access. It also demonstrates steganography using StagHide to embed a secret file inside an image or WAV audio by altering least significant bits. Detection techniques then map to each method: show hidden files, check file signatures against extensions, list ADS with `dir /r`, flag suspicious file sizes, and use steganalysis tools to look for embedding artifacts. The practical value is that concealment and detection are two sides of the same checklist.
How can a file be made “invisible” in Windows without deleting it?
What makes NTFS Alternate Data Streams (ADS) different from renaming or using hidden attributes?
How does VeraCrypt’s hidden volume provide plausible deniability?
Why can steganography hide files inside images or audio so well?
What practical signs help detect hidden files and hidden data?
Review Questions
- Which detection step would most directly uncover NTFS Alternate Data Streams, and what command is used?
- What two-password structure enables plausible deniability in VeraCrypt hidden volumes?
- What constraint must be satisfied for steganography embedding to work, and how is extraction performed?
Key Points
- 1
Windows hidden attributes remove files from normal Explorer views until hidden items are enabled in folder options.
- 2
Blank-looking folders can be created by using special characters for the name and assigning a blank icon, making them harder to notice even though they remain accessible.
- 3
Linux/macOS hiding commonly relies on a leading dot in filenames; `ls -a` reveals them.
- 4
Misdirection works by making filenames/extensions disagree with actual file signatures, which can be detected by signature/footprint checks.
- 5
NTFS Alternate Data Streams can store extra data inside a file without changing its visible size, and ADS can be revealed with `dir /r`.
- 6
VeraCrypt hidden volumes use nested encryption and separate passwords so the outer password shows a decoy while the hidden password reveals the real payload.
- 7
Steganography embeds data into images or audio via least significant bit changes; detection can use steganalysis tools that look for embedding artifacts.