diff --git a/subjects/cybersecurity/image-inspector/README.md b/subjects/cybersecurity/image-inspector/README.md index cdf1e9e79..777233ece 100644 --- a/subjects/cybersecurity/image-inspector/README.md +++ b/subjects/cybersecurity/image-inspector/README.md @@ -84,7 +84,7 @@ OPTIONS: #### Example Outputs: ```sh -$> image-inspector -m image-example.jpeg -o metadata.txt +$> image-inspector -m -o metadata.txt image-example1.jpeg Lat/Lon: (13.731) / (-1.1373) Device: Canon EOS 5D Mark III Date: 2023-07-20 14:32:10 @@ -92,7 +92,7 @@ Data saved in metadata.txt ``` ```sh -$> image-inspector -s image-example.jpeg -o hidden_data.txt +$> image-inspector -s -o hidden_data.txt image-example1.jpeg -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 01 ... @@ -101,7 +101,15 @@ Data saved in hidden_data.txt ``` **You will be provided with an example image to test your tool. Make sure your tool can successfully analyze this image and produce the expected outputs.** -The example image attached: [image-example.jpeg](resources/image-example.jpeg) +The example image attached: +[image-example1.jpeg](resources/image-example1.jpeg) +[image-example2.jpeg](resources/image-example2.jpeg) +[image-example3.jpeg](resources/image-example3.jpeg) +[image-example4.jpeg](resources/image-example4.jpeg) + +#### Documentation + +Create a `README.md` file that provides comprehensive documentation for your tool (prerequisites, setup, configuration, usage, ...). Ensure the documentation includes clear guidelines on the ethical use of the tool and warnings about the legal implications of analyzing images without permission. ### Bonus @@ -109,14 +117,9 @@ If you complete the mandatory part successfully and still have time, consider ad - **Additional Steganography Methods**: Implement detection for other steganography techniques beyond PGP keys. - **Graphical User Interface (GUI)**: Create a user-friendly GUI using libraries like Tkinter or PyQT. -- **Facial Recognition**: Implement basic facial recognition features using OpenCV. Challenge yourself! -### Documentation - -Create a `README.md` file that provides comprehensive documentation for your tool (prerequisites, setup, configuration, usage, ...). Ensure the documentation includes clear guidelines on the ethical use of the tool and warnings about the legal implications of analyzing images without permission. - ### Ethical and Legal Considerations - **Get Permission**: Always obtain explicit permission before analyzing any image. diff --git a/subjects/cybersecurity/image-inspector/audit/README.md b/subjects/cybersecurity/image-inspector/audit/README.md index 4adbf3cfe..03ad9adce 100644 --- a/subjects/cybersecurity/image-inspector/audit/README.md +++ b/subjects/cybersecurity/image-inspector/audit/README.md @@ -19,7 +19,6 @@ Suggested role play questions include: - What is metadata in the context of digital images, and why is it important? - How does steganography work, and what are its potential uses and risks? - What challenges did you face while developing the Image Inspector tool, and how did you address them? -- How does the Image Inspector tool help in identifying hidden information within images? - How can this tool be used in real-life digital forensics or cybersecurity scenarios? - What ethical considerations should be taken into account when analyzing images for hidden data? @@ -52,7 +51,7 @@ $> image-inspector --help 2. **Metadata Extraction Option:** ```sh -$> image-inspector -m image-example.jpeg -o metadata.txt +$> image-inspector -m -o metadata.txt image-example1.jpeg ``` ###### Does the output correctly extract and display metadata such as geolocation, device information, and date/time? @@ -62,7 +61,7 @@ $> image-inspector -m image-example.jpeg -o metadata.txt 3. **Steganography Detection Option:** ```sh -$> image-inspector -s image-example.jpeg -o hidden_data.txt +$> image-inspector -s -o hidden_data.txt image-example1.jpeg ``` ###### Does the output correctly detect and extract any hidden PGP keys or other concealed information within the image? @@ -72,7 +71,11 @@ $> image-inspector -s image-example.jpeg -o hidden_data.txt ##### Testing with Images **You will be provided with an example image to test the students tool. Feel free to test with other images.** -The example image attached: [image-example.jpeg](../resources/image-example.jpeg) +The example image attached: +[image-example1.jpeg](resources/image-example1.jpeg) +[image-example2.jpeg](resources/image-example2.jpeg) +[image-example3.jpeg](resources/image-example3.jpeg) +[image-example4.jpeg](resources/image-example4.jpeg) ###### Test the tool with the provided example image and at least one other image to ensure the tool's robustness. diff --git a/subjects/cybersecurity/image-inspector/resources/image-example.jpeg b/subjects/cybersecurity/image-inspector/resources/image-example1.jpeg similarity index 100% rename from subjects/cybersecurity/image-inspector/resources/image-example.jpeg rename to subjects/cybersecurity/image-inspector/resources/image-example1.jpeg diff --git a/subjects/cybersecurity/image-inspector/resources/image-example2.jpeg b/subjects/cybersecurity/image-inspector/resources/image-example2.jpeg new file mode 100644 index 000000000..65c8dc8ea Binary files /dev/null and b/subjects/cybersecurity/image-inspector/resources/image-example2.jpeg differ diff --git a/subjects/cybersecurity/image-inspector/resources/image-example3.jpeg b/subjects/cybersecurity/image-inspector/resources/image-example3.jpeg new file mode 100644 index 000000000..dfb518ae3 Binary files /dev/null and b/subjects/cybersecurity/image-inspector/resources/image-example3.jpeg differ diff --git a/subjects/cybersecurity/image-inspector/resources/image-example4.jpeg b/subjects/cybersecurity/image-inspector/resources/image-example4.jpeg new file mode 100644 index 000000000..5f830664b Binary files /dev/null and b/subjects/cybersecurity/image-inspector/resources/image-example4.jpeg differ