Information Technology And Cyber Security
Lab 10
Arjun Singh
500120502
Batch:-4 CSF
ExifTool — Metadata Analysis & Manipulation
● Purpose: To view, edit, copy, or remove metadata from images or
other files.
● Why: Metadata can reveal important forensic info like device used,
location, timestamps, authorship, etc.
● Use Case: Checking if an image has GPS coordinates or camera info,
removing metadata for privacy.
Commands
1.Install ExifTool (if not installed):
sudo apt install libimage-exiftool-perl
2.Read all metadata from an image:
exiftool image.jpg
3.Read specific tags:
exiftool -Make -Model -DateTimeOriginal image.jpg
4.Write metadata (e.g., add artist name):
exiftool -Artist="Your Name" image.jpg
5.Delete specific metadata (GPS):
exiftool -GPSLatitude= -GPSLongitude= image.jpg
6.Remove all metadata:
exiftool -overwrite_original -all= image.jpg
7.Copy metadata from one file to another:
exiftool -tagsfromfile source.jpg destination.jpg
strings — Extract Readable Text from Binaries
● Purpose: To pull out human-readable strings from executable or
binary files.
● Why: You can find hidden messages, passwords, URLs, or
suspicious content inside compiled programs or malware.
● Use Case: Discovering URLs or credentials in a suspicious .exe or
.bin file.
1.Basic usage:
strings /bin/ls
2.Set minimum length:
strings -n 8 /bin/ls
3.Show file offsets:
strings -td /bin/ls | head -n 10 # Decimal
strings -tx /bin/ls | head -n 10 # Hex
4.Search for specific text:
strings suspicious_file | grep "http://"
binwalk — Analyze Firmware or Binary Files
● Purpose: To detect and extract embedded files
or data inside firmware images.
● Why: Useful in reverse engineering firmware
to understand how a device works or find
vulnerabilities.
● Use Case: Extracting images, file systems, or
configs from an IoT firmware .bin file.
dirb — Discover Hidden Web Directories
● Purpose: To brute-force and find hidden/unlinked files or
directories on a website.
● Why: These hidden paths could expose sensitive data (admin
panels, backups, config files, etc.).
● Use Case: Finding a forgotten /admin_backup/ folder that
exposes credentials.