O'Reilly logo

Penetration Testing with Perl by Swizec Teller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Metadata Forensics

Forensic data can be thought of as data and clues that tell us things about the past. For instance, metadata from images or other files can tell us a lot about how that file was created and by whom. Logs of logins, users, and even credential data on compromised servers can be used against our target from many different angles. In this chapter, we will be designing a Perl program that can be used during a penetration test for searching through the metadata of files found on the public web servers of our victim target.

Metadata and Exif

Metadata is data about a file or an organized collection of data. Data mining and information gathering can be extended into analyzing simple Exchangeable Image Formatted (Exif) images ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required