Browse Source

Revert "CON-3132 docs(image-inspector) fix the requested changes"

This reverts commit 9b8c58738e.
pull/2730/head
Zouhair AMAZZAL 2 months ago committed by GitHub
parent
commit
d1f8451144
  1. 19
      subjects/cybersecurity/image-inspector/README.md
  2. 11
      subjects/cybersecurity/image-inspector/audit/README.md
  3. 0
      subjects/cybersecurity/image-inspector/resources/image-example.jpeg
  4. BIN
      subjects/cybersecurity/image-inspector/resources/image-example2.jpeg
  5. BIN
      subjects/cybersecurity/image-inspector/resources/image-example3.jpeg
  6. BIN
      subjects/cybersecurity/image-inspector/resources/image-example4.jpeg

19
subjects/cybersecurity/image-inspector/README.md

@ -84,7 +84,7 @@ OPTIONS:
#### Example Outputs:
```sh
$> image-inspector -m -o metadata.txt image-example1.jpeg
$> image-inspector -m image-example.jpeg -o metadata.txt
Lat/Lon: (13.731) / (-1.1373)
Device: Canon EOS 5D Mark III
Date: 2023-07-20 14:32:10
@ -92,7 +92,7 @@ Data saved in metadata.txt
```
```sh
$> image-inspector -s -o hidden_data.txt image-example1.jpeg
$> image-inspector -s image-example.jpeg -o hidden_data.txt
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 01
...
@ -101,15 +101,7 @@ Data saved in hidden_data.txt
```
**You will be provided with an example image to test your tool. Make sure your tool can successfully analyze this image and produce the expected outputs.**
The example image attached:
[image-example1.jpeg](resources/image-example1.jpeg)
[image-example2.jpeg](resources/image-example2.jpeg)
[image-example3.jpeg](resources/image-example3.jpeg)
[image-example4.jpeg](resources/image-example4.jpeg)
#### Documentation
Create a `README.md` file that provides comprehensive documentation for your tool (prerequisites, setup, configuration, usage, ...). Ensure the documentation includes clear guidelines on the ethical use of the tool and warnings about the legal implications of analyzing images without permission.
The example image attached: [image-example.jpeg](resources/image-example.jpeg)
### Bonus
@ -117,9 +109,14 @@ If you complete the mandatory part successfully and still have time, consider ad
- **Additional Steganography Methods**: Implement detection for other steganography techniques beyond PGP keys.
- **Graphical User Interface (GUI)**: Create a user-friendly GUI using libraries like Tkinter or PyQT.
- **Facial Recognition**: Implement basic facial recognition features using OpenCV.
Challenge yourself!
### Documentation
Create a `README.md` file that provides comprehensive documentation for your tool (prerequisites, setup, configuration, usage, ...). Ensure the documentation includes clear guidelines on the ethical use of the tool and warnings about the legal implications of analyzing images without permission.
### Ethical and Legal Considerations
- **Get Permission**: Always obtain explicit permission before analyzing any image.

11
subjects/cybersecurity/image-inspector/audit/README.md

@ -19,6 +19,7 @@ Suggested role play questions include:
- What is metadata in the context of digital images, and why is it important?
- How does steganography work, and what are its potential uses and risks?
- What challenges did you face while developing the Image Inspector tool, and how did you address them?
- How does the Image Inspector tool help in identifying hidden information within images?
- How can this tool be used in real-life digital forensics or cybersecurity scenarios?
- What ethical considerations should be taken into account when analyzing images for hidden data?
@ -51,7 +52,7 @@ $> image-inspector --help
2. **Metadata Extraction Option:**
```sh
$> image-inspector -m -o metadata.txt image-example1.jpeg
$> image-inspector -m image-example.jpeg -o metadata.txt
```
###### Does the output correctly extract and display metadata such as geolocation, device information, and date/time?
@ -61,7 +62,7 @@ $> image-inspector -m -o metadata.txt image-example1.jpeg
3. **Steganography Detection Option:**
```sh
$> image-inspector -s -o hidden_data.txt image-example1.jpeg
$> image-inspector -s image-example.jpeg -o hidden_data.txt
```
###### Does the output correctly detect and extract any hidden PGP keys or other concealed information within the image?
@ -71,11 +72,7 @@ $> image-inspector -s -o hidden_data.txt image-example1.jpeg
##### Testing with Images
**You will be provided with an example image to test the students tool. Feel free to test with other images.**
The example image attached:
[image-example1.jpeg](resources/image-example1.jpeg)
[image-example2.jpeg](resources/image-example2.jpeg)
[image-example3.jpeg](resources/image-example3.jpeg)
[image-example4.jpeg](resources/image-example4.jpeg)
The example image attached: [image-example.jpeg](../resources/image-example.jpeg)
###### Test the tool with the provided example image and at least one other image to ensure the tool's robustness.

0
subjects/cybersecurity/image-inspector/resources/image-example1.jpeg → subjects/cybersecurity/image-inspector/resources/image-example.jpeg

Before

Width:  |  Height:  |  Size: 47 KiB

After

Width:  |  Height:  |  Size: 47 KiB

BIN
subjects/cybersecurity/image-inspector/resources/image-example2.jpeg

diff.bin_not_shown

Before

Width:  |  Height:  |  Size: 195 KiB

BIN
subjects/cybersecurity/image-inspector/resources/image-example3.jpeg

diff.bin_not_shown

Before

Width:  |  Height:  |  Size: 2.2 MiB

BIN
subjects/cybersecurity/image-inspector/resources/image-example4.jpeg

diff.bin_not_shown

Before

Width:  |  Height:  |  Size: 2.8 KiB

Loading…
Cancel
Save