You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 
davhojt 78016943b0
docs(cybersecurity): add warning to advise that projects are for educative purposes only
2 years ago
..
audit docs(inspector-image): remove quote-block which caused audits to fail 2 years ago
README.md docs(cybersecurity): add warning to advise that projects are for educative purposes only 2 years ago
image.jpeg docs(cibersecurity): add cibersecurity branch subjects to public 2 years ago

README.md

Inspector Image

Objective

Discover a new method of passive analysis

Discover some basic image recognition approaches

See what steganography is, and what information an image can hide

Advice

I strongly advise to do this project in Python
https://en.wikipedia.org/wiki/Steganography
https://en.wikipedia.org/wiki/Exif

Instructions

Your program should show the pgp key which is hidden in the image

The location where this photo was taken

  • The project has to be written in an interpreted language (I highly recommend Python).

This project will help you discover:

  • Image recognition
  • Steganography
  • Metadata

Bonus

You can add more features in this order:

  • Added more steganography methods

  • Added GUI (Tkinter, QT and GTK are allowed)

  • Facial recognition on two images compared(OpenCV is allowed)

  • Other advanced features.

Usage

$>  image -map image.jpeg
Lat/Lon:	(13.731) / (-1.1373)

$> image -steg image.jpeg
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 01
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=N8hc
-----END PGP PUBLIC KEY BLOCK-----
$>

Submission and audit

Files that must be inside your repository:

  • Your program source code.
  • a README.md file, Which clearly explains how to use the program.

Don’t hesitate to double check the names of your folders and files to ensure they are correct!

These methods and tools are for educational purposes only, so that you have a better understanding of how to protect against similar vulnerabilities. You must ensure that you do not attempt any exploit-type activity without the explicit permission of the owner of the machine, system or application. Failure to obtain permission risks breaking the law.