If you do, you can try the exiftool with it and you will get a lot more information like the camera type, date picture was taken, and more. Now I can read each of the text files with vim. In my case, I have about 6 images to run that command on, so I will run the tool recursively to output all the results for image files in a folder into. The exiftool can be used to read metadata from files like so: After this vague meta data, I went ahead to use the exiftool to grab more data from the images. If we’ll be covering our data with some of these images, we need to have an idea of what information the image already has. I tried the same on other image file types and the output was: This shows that the JPEG images are stored in JFIF format. I’m making use of the “file” command in my Linux shell to gather information on some images here: Just like reconnaissance has to be done for everything we do as security professionals, we also need to gather information on files we will make use of. I will advise you read this previously written article before proceeding. Fill out the form below to get the downloadable tool accompanying this article. That gives us hidden writing for steganography and secret writing for cryptography.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |