Obtain Valuable Data from Images During Recon Using EXIF Extractors [Tutorial]
How to Discover Hidden Photo Metadata with EXIF Viewers
Full Tutorial: http://bit.ly/EXIFrecon
Subscribe to Null Byte: https://goo.gl/J6wEnH
Kody's Twitter: https://twitter.com/KodyKinzie
Images can possess valuable metadata such as geolocations, dates, and camera model that can help verify a source or provide meaningful information about a target in an investigation. Knowing how to access this data is crucial. On today's episode of Cyber Weapons Lab, we'll show you how to use three convenient EXIF data extractors to data mine images you find online.
Follow Null Byte on:
Twitter: https://twitter.com/nullbytewht
Flipboard: https://flip.it/3.Gf_0
Weekly newsletter: https://eepurl.com/dE3Ovb
Видео Obtain Valuable Data from Images During Recon Using EXIF Extractors [Tutorial] канала Null Byte
Full Tutorial: http://bit.ly/EXIFrecon
Subscribe to Null Byte: https://goo.gl/J6wEnH
Kody's Twitter: https://twitter.com/KodyKinzie
Images can possess valuable metadata such as geolocations, dates, and camera model that can help verify a source or provide meaningful information about a target in an investigation. Knowing how to access this data is crucial. On today's episode of Cyber Weapons Lab, we'll show you how to use three convenient EXIF data extractors to data mine images you find online.
Follow Null Byte on:
Twitter: https://twitter.com/nullbytewht
Flipboard: https://flip.it/3.Gf_0
Weekly newsletter: https://eepurl.com/dE3Ovb
Видео Obtain Valuable Data from Images During Recon Using EXIF Extractors [Tutorial] канала Null Byte
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Encrypt your Private Text, Photo & Archive Files with EncryptPad [Tutorial]Set Up Aliasing in Your Mac's Bash Profile for Easier Wi-Fi Packet Captures [Tutorial]Bypass VPNs to Track a Mac with Arduino [Tutorial]Monitor Live Twitter Discussions with Maltego for Disinformation Attacks [Tutorial]Use Noisy.py to Cloak Your Internet Activity from Network Surveillance [Tutorial]Perform Browser OSINT with the Mitaka Extension [Tutorial]Spy on Network Relationships with Airgraph-ng [Tutorial]Share Files & Chat Privately Offline with a Raspberry Pi PirateBox [Tutorial]Watch Hackers Demonstrate Windows Exploits & Privilege Escalation (ft. Kilian from SecurityFWD)Build a Pumpkin Pi — A Rogue AP & MitM Framework That Fits in Your Pocket [Tutorial]Update: New YouTube Policy & Exciting Episodes to Come!Track a Target Using Canary Token Tracking Links [Tutorial]Track Devices via Probe Frames with Probequest [Tutorial]Null Byte's First Q&A Livestream with Kody & MichaelLocate Breached Account Data with H8mail [Tutorial]Watch Hackers Demonstrate a Ransomware Attack (ft. Kilian from SecurityFWD)Explore & Map Nearby Wireless Networks with WiGLE [Tutorial]Intercept Packets with Sniffglue Without Opening Yourself Up to Zero-Days [Tutorial]Create Rogue APs with MicroPython on an ESP8266 Board [Tutorial]Use Nmap for Tactical Network Reconnaissance [Tutorial]Find Employee Accounts with Password Breaches Using Maltego [Tutorial]