Browse Source

CON-3132 docs(image-inspector) improve audit and subject

pull/2742/head
Zouhair AMAZZAL 4 weeks ago committed by Zouhair AMAZZAL
parent
commit
82e7bb75d5
  1. 2
      subjects/cybersecurity/image-inspector/README.md
  2. 49
      subjects/cybersecurity/image-inspector/audit/README.md

2
subjects/cybersecurity/image-inspector/README.md

@ -13,7 +13,7 @@ Images can contain more than just visual information, they often carry hidden da
The goal is to develop a tool using a programming language of your choice (Python is recommended) that can analyze images to extract hidden information. Specifically, your tool should:
1. **Extract Metadata**: Identify and display metadata from images, such as geolocation (latitude and longitude) where the photo was taken, the device used, and other relevant information.
2. **Detect Steganography**: Discover and extract any hidden PGP keys or other data concealed within the image using steganography techniques.
2. **Detect Steganography**: Discover and extract any hidden PGP keys within the image using steganography techniques.
By completing this project, you will:

49
subjects/cybersecurity/image-inspector/audit/README.md

@ -22,8 +22,6 @@ Suggested role play questions include:
- How can this tool be used in real-life digital forensics or cybersecurity scenarios?
- What ethical considerations should be taken into account when analyzing images for hidden data?
###### Were the students able to answer all the questions?
###### Did the students demonstrate a thorough understanding of the concepts and technologies used in the project?
###### Were the students able to communicate effectively and justify their decisions and explain the knowledge behind this project?
@ -64,7 +62,7 @@ $> image-inspector -m -o metadata.txt image-example1.jpeg
$> image-inspector -s -o hidden_data.txt image-example1.jpeg
```
###### Does the output correctly detect and extract any hidden PGP keys or other concealed information within the image?
###### Does the output correctly detect and extract any hidden PGP keys within the image?
###### Is the output stored in the file specified in the output parameter?
@ -79,18 +77,47 @@ The example image attached:
###### Test the tool with the provided example image and at least one other image to ensure the tool's robustness.
###### Does the tool produce accurate and expected results for different images?
```sh
$> image-inspector -s -o hidden_data1.txt image-example1.jpeg
Enter -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 01
mQENBGIwpy4BC<...>
=N8hc
-----END PGP PUBLIC KEY BLOCK-----
$>
```
```sh
$> image-inspector -s -o hidden_data2.txt image-example2.jpeg
-----BEGIN PGP PUBLIC KEY BLOCK-----
xo0EZuV9/AEEANRklh3<...>
=BhsK
-----END PGP PUBLIC KEY BLOCK-----
$>
```
##### Ensure that the student submission meets the project requirements:
```sh
$> image-inspector -s -o hidden_data3.txt image-example3.jpeg
-----BEGIN PGP PUBLIC KEY BLOCK-----
xo0EZuWBWQEEALrj<...>
=SXXm
-----END PGP PUBLIC KEY BLOCK-----
$>
```
1. **Functionality:** Does the tool perform its intended functions accurately (metadata extraction and steganography detection)?
2. **Data Accuracy:** Is the retrieved information accurate and relevant?
3. **Ethical Considerations:** Are there clear guidelines and warnings about the ethical and legal use of the tool?
4. **Usability:** Is the tool user-friendly and well-documented?
```sh
$> image-inspector -s -o hidden_data4.txt image-example4.jpeg
-----BEGIN PGP PUBLIC KEY BLOCK-----
xo0EZuWA9AE<...>
=/1dE
-----END PGP PUBLIC KEY BLOCK-----
$>
```
###### Did the tool design and implementation align with all the project requirements above?
> The results are cut. you can compare the beginning and the end of the results!
###### Were the students able to implement a functional and reliable tool that meets the project requirements?
###### Does the tool produce accurate and expected results for different images?
#### Bonus

Loading…
Cancel
Save