0% found this document useful (0 votes)
12 views7 pages

Lab 10

The document outlines various tools and commands for metadata analysis and manipulation, including ExifTool, strings, binwalk, and dirb. It highlights their purposes, use cases, and specific commands for extracting or editing metadata, readable text from binaries, analyzing firmware, and discovering hidden web directories. Each tool serves a distinct function in the realm of information technology and cybersecurity.

Uploaded by

Prasha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views7 pages

Lab 10

The document outlines various tools and commands for metadata analysis and manipulation, including ExifTool, strings, binwalk, and dirb. It highlights their purposes, use cases, and specific commands for extracting or editing metadata, readable text from binaries, analyzing firmware, and discovering hidden web directories. Each tool serves a distinct function in the realm of information technology and cybersecurity.

Uploaded by

Prasha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Information Technology And Cyber Security

Lab 10

Arjun Singh
500120502
Batch:-4 CSF
ExifTool — Metadata Analysis & Manipulation

●​ Purpose: To view, edit, copy, or remove metadata from images or


other files.
●​ Why: Metadata can reveal important forensic info like device used,
location, timestamps, authorship, etc.
●​ Use Case: Checking if an image has GPS coordinates or camera info,
removing metadata for privacy.

Commands
1.Install ExifTool (if not installed):​

sudo apt install libimage-exiftool-perl

2.Read all metadata from an image:​



exiftool image.jpg
3.Read specific tags:​

exiftool -Make -Model -DateTimeOriginal image.jpg

4.Write metadata (e.g., add artist name):​



exiftool -Artist="Your Name" image.jpg

5.Delete specific metadata (GPS):​



exiftool -GPSLatitude= -GPSLongitude= image.jpg

6.Remove all metadata:​



exiftool -overwrite_original -all= image.jpg

7.Copy metadata from one file to another:​



exiftool -tagsfromfile source.jpg destination.jpg
strings — Extract Readable Text from Binaries

●​ Purpose: To pull out human-readable strings from executable or


binary files.
●​ Why: You can find hidden messages, passwords, URLs, or
suspicious content inside compiled programs or malware.
●​ Use Case: Discovering URLs or credentials in a suspicious .exe or
.bin file.

1.Basic usage:​

strings /bin/ls
2.Set minimum length:​

strings -n 8 /bin/ls

3.Show file offsets:​



strings -td /bin/ls | head -n 10 # Decimal

strings -tx /bin/ls | head -n 10 # Hex


4.Search for specific text:


strings suspicious_file | grep "http://"

binwalk — Analyze Firmware or Binary Files

●​ Purpose: To detect and extract embedded files


or data inside firmware images.
●​ Why: Useful in reverse engineering firmware
to understand how a device works or find
vulnerabilities.
●​ Use Case: Extracting images, file systems, or
configs from an IoT firmware .bin file.
dirb — Discover Hidden Web Directories

●​ Purpose: To brute-force and find hidden/unlinked files or


directories on a website.
●​ Why: These hidden paths could expose sensitive data (admin
panels, backups, config files, etc.).
●​ Use Case: Finding a forgotten /admin_backup/ folder that
exposes credentials.

You might also like