public/subjects/cybersecurity/inspector-image
davhojt 78016943b0
docs(cybersecurity): add warning to advise that projects are for educative purposes only
2023-03-31 15:57:51 +03:00
..
audit docs(inspector-image): remove quote-block which caused audits to fail 2023-03-29 14:49:21 +00:00
README.md docs(cybersecurity): add warning to advise that projects are for educative purposes only 2023-03-31 15:57:51 +03:00
image.jpeg docs(cibersecurity): add cibersecurity branch subjects to public 2022-12-12 17:44:29 +00:00

README.md

Inspector Image

Objective

Discover a new method of passive analysis

Discover some basic image recognition approaches

See what steganography is, and what information an image can hide

Advice

I strongly advise to do this project in Python
https://en.wikipedia.org/wiki/Steganography
https://en.wikipedia.org/wiki/Exif

Instructions

Your program should show the pgp key which is hidden in the image

The location where this photo was taken

  • The project has to be written in an interpreted language (I highly recommend Python).

This project will help you discover:

  • Image recognition
  • Steganography
  • Metadata

Bonus

You can add more features in this order:

  • Added more steganography methods

  • Added GUI (Tkinter, QT and GTK are allowed)

  • Facial recognition on two images compared(OpenCV is allowed)

  • Other advanced features.

Usage

$>  image -map image.jpeg
Lat/Lon:	(13.731) / (-1.1373)

$> image -steg image.jpeg
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 01

mQENBGIwpy4BCACFayWXCgHH2QqXkicbqD1ZlMUALpyGxDFiWh1SErFUPJOO/CgU
2688bAd26kxDSGShiL9YUOQJ6MS+zJ0KlBkeKPoQlPHRBVpH7vjcRbZNgDxd82uE
7mhM6AH+W3fAim/PhU3lm661UGMCHM3YLupa/N0Dhhmfimtg+0AimCoXk6Q6WJxg
ao8XY1Wqacd2L0ssASY5EkMahNgtX0Ri8snbTlImd5Jq/sC4buZq96IlxyhtX0ew
zD/md0U++8SxG9+gi+uuImqV8Wq1YHvJH5BtIbfcNG9V00+03ikEX9tppKxCkhzx
9rSqvyH6Uirs3FVhFtoXUSg8IeYgSH6p5tsVABEBAAG0CDAxQDAxLjAxiQEcBBAB
AgAGBQJiMKcuAAoJEAJuInmYDhhbO3gIAITZhEtLBj524y1oeBKI5fZDwgCQum6B
D9ZaUq1+dI98HsiRAiUqw1YbuJQgeUVGCmqXeC3E7VTPCPZsaCLfWWZVeosRIqB8
PwGxcY6vXHYR4S6T8rHwsNASw+Vo2pmQIGn4tABmtyappqJbwSz+5yg73DjYXiX/
e/f6i9nrFFsfMjjKd71cAyHjV8u0z7fGDXpR22vo7CdloXMxsZRyHjd/4ofUgvu0
6hWYG2zBWTXpwaYRU9u1NCr1gfKnukm8gbILSSgjr8pQ3OLWHleJXc0sCEJFKSbg
+I0KJP7Ccrxy0MaKYk0T0tYbBrvqQCzXqzAqcjn+1GoDDS1J8WBJopM=
=N8hc
-----END PGP PUBLIC KEY BLOCK-----
$>

Submission and audit

Files that must be inside your repository:

  • Your program source code.
  • a README.md file, Which clearly explains how to use the program.

Dont hesitate to double check the names of your folders and files to ensure they are correct!

⚠️ These methods and tools are for educational purposes only, so that you have a better understanding of how to protect against similar vulnerabilities. You must ensure that you do not attempt any exploit-type activity without the explicit permission of the owner of the machine, system or application. Failure to obtain permission risks breaking the law.