Jump to content

Search the Community

Showing results for tags 'metadata'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Informatii generale
    • Anunturi importante
    • Bine ai venit
    • Proiecte RST
  • Sectiunea tehnica
    • Exploituri
    • Challenges (CTF)
    • Bug Bounty
    • Programare
    • Securitate web
    • Reverse engineering & exploit development
    • Mobile security
    • Sisteme de operare si discutii hardware
    • Electronica
    • Wireless Pentesting
    • Black SEO & monetizare
  • Tutoriale
    • Tutoriale in romana
    • Tutoriale in engleza
    • Tutoriale video
  • Programe
    • Programe hacking
    • Programe securitate
    • Programe utile
    • Free stuff
  • Discutii generale
    • RST Market
    • Off-topic
    • Discutii incepatori
    • Stiri securitate
    • Linkuri
    • Cosul de gunoi
  • Club Test's Topics
  • Clubul saraciei absolute's Topics
  • Chernobyl Hackers's Topics
  • Programming & Fun's Jokes / Funny pictures (programming related!)
  • Programming & Fun's Programming
  • Programming & Fun's Programming challenges
  • Bani pă net's Topics
  • Cumparaturi online's Topics
  • Web Development's Forum
  • 3D Print's Topics

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Yahoo


Jabber


Skype


Location


Interests


Biography


Location


Interests


Occupation

Found 5 results

  1. Salutare. In ultimele 3 luni am lucrat la un proiect un pic mai ambitios de cercetare in care am vrut sa cuprind mai multe sfere de interes - pornind de la IoT (in special camere de supraveghere si SCADA), putin crypto forensics (BTC), firmware extraction (unde m-am rezumat la binwalk, firmadyne, firmwalker ca si 3rd party integration), metadata extraction + hashing si un modul de ML folosind Random Forests pe o baza de date sintetica cu 33 de variable ( vendor, densitate device-uri, bug bounty programs, tech stack, jurisdictia sub care opereaza, IP, ASN, services, port number, organization, packet header, MAC etc). Pentru l33t h@x0rs am inclus si un modul de obfuscation (via pyarmor). Proiectul vine cu o documentatie completa (R&D journal) ce cuprinde progresul pe care l-am facut in fiecare zi, screenshot-uri, cat si bibliografia completa - 190 titluri, aveti in total 174 de pagini de continut numerotat si formatat. Pe langa tema proiectului am atins si cativa algoritmi gen ssdeep, Rabin Karp, putin reverse engineering, industrial communication protocols, sisteme de operare, fake ID generation, fake news generation, fake facial features generation (via GANs). Abordarea e una relaxata, mai aveti meme-uri din cand in cand, nimic stufos. In repo am inclus si ToS.pdf ce contine terms of use, va rog sa cititi inainte. Va recomand sa incepeti cu whitepaper-ul mai intai, acolo e principala sursa de informatie si componenta principala a proiectului. PDF-ul e pe Google Drive. Atasez link-ul: https://drive.google.com/open?id=1ABSp209AUEKh5DkKqth_HxYidrfMzIA_ Are 167 MB, probabil va dura ceva timp pana il luati, dar, insist, incepeti cu asta, sunt multe resurse acolo, link-uri, repo-uri, carti si studii de caz care va vor ajuta mult mai mult. Have fun https://github.com/cionutmihai/Philter
  2. The law that the Obama administration cites to allow bulk telephone metadata collection expires on June 1, and the FBI has already begun lobbying to keep Section 215 of the Patriot Act from expiring. Bad guys "going dark" using encryption, the FBI says, is one of the reasons why the government needs to collect the metadata of every phone call made to and from the United States. Robert Anderson, the FBI’s chief of the Criminal, Cyber, Response, and Services Branch, told reporters during a roundtable discussion Tuesday that the Patriot Act is necessary because encrypted communications are becoming more commonplace in the wake of the Edward Snowden disclosures. "In the last two to three years, that whole ‘going dark’ thing went from a crawl to a flat-out sprint because the technology is changing so rapidly," Anderson said. Joseph Demarest, assistant director of the FBI's Cyber Division, told reporters that if Section 215 expires, "Obviously it’s going to impact what we do as an organization and certainly on cyber." The comments, especially as they relate to encryption, are part of a growing chorus of calls—from as high as President Barack Obama—that the government needs Silicon Valley's assistance for backdoors into encrypted tech products like the iPhone. Silicon Valley has (at least publicly) shunned the administration's attempts to get backdoors into their products. And while no legislation at the moment requires them to comply, the nation's spy apparatus and others are turning their attention toward not losing the bulk telephone metadata spying program that spun heads when The Guardian—armed with classified documents from Snowden—exposed it in 2013. As it turns out, the secret Foreign Intelligence Surveillance Act court that was authorizing the program was doing so under the authority of Section 215 of the Patriot Act. While many leading lawmakers are behind renewing the program, there are plenty of reasons why it should expire come June. According to the EFF: One federal judge has upheld the program while another has declared it unconstitutional. A Supreme Court showdown over the snooping isn't likely to happen any time soon. There's plenty of rhetoric on all sides of the issue, too. Sen. Marco Rubio (R-FL) said Section 215 should never expire. House Speaker John Boehner (R-Ohio) and Majority Leader Mitch McConnell (R-KY) are big fans of Section 215. Sens. Ron Wyden (D-OR) and Martin Heinrich (D-NM) said that "none of the claims appear to hold up to scrutiny" that the bulk metadata collection program prevents terrorism. When Congress publicly re-authorized Section 215 three years ago, the public didn't know that lawmakers were secretly approving the bulk telephone metadata program. And some lawmakers who had voted for re-authorization claimed that they didn't even know about the bulk collection program. At least this time, when it comes up for a vote in the coming months, lawmakers can't claim that they didn't know they were voting to allow the government to scoop up data that includes phone numbers of parties involved in calls, calling card numbers, the time and duration of the calls, and the international mobile subscriber identity number for mobile callers. The database is said to have more than 1 trillion records. Source
  3. Spotlight is name of Apple OSX’s desktop search functionality. It indexes all the files on a volume storing metadata about filesystem object (e.g. file, directory) in an effort to provide fast and extensive file searching capabilities. The metadata stored includes familiar filesystem metadata, as in MAC times as well as file-internal metadata like image dimensions and color model. Spotlight allows users to search for documents with the Author tag “Snowden,” for example. These databases are created by OSX on each volume the machine can access, including flash drives. They can be found at the path: /.Spotlight-V100/Store-V2/<SomeHash>/store.db for each volume; we have also provided access to some sample databases with the tool download. 504ensics is proud to introduce our newest forensic tool, Spotlight Inspector (SI). This is a brand new tool we’re developing for the analysis of OSX Spotlight databases. It parses Spotlight metadata databases and provides functionality to work with the internal data in a clean and useful way. On to some features! Download: Spotlight Inspector Digital Forensics Tool Announced | 504ENSICS Labs
  4. Din cate probabil stiti, google indexeaza mult mai multe informatii decat vedem in motorul de cautare in mod obisnuit. La aceste informatii se adauga si metadata din imagini. Am observat asta cautand in google images dupa niste tag-uri si am examinat o imagine sa vad pe ce criteriu mi-a aparut in search pentru ca numele acesteia nu avea nicio legatura cu ce am cautat eu. Imaginea am analizat-o cu exiftool Sa vedem cum sta treaba. Descarcam o imagine de pe un site oarecare: marian@pluto:~/work/seo$ curl -o imagine.jpg http://cache.pakistantoday.com.pk/2013/05/5274-gun-fire-WallFizz.jpg % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 341k 100 341k 0 0 180k 0 0:00:01 0:00:01 --:--:-- 248k marian@pluto:~/work/seo$ Vedem ce informatii meta contine imaginea originala: macbook seo$ exiftool-5.12 imagine.jpg ExifTool Version Number : 9.06 File Name : imagine.jpg Directory : . File Size : 49 kB File Modification Date/Time : 2014:01:16 23:35:43+02:00 File Access Date/Time : 2014:01:16 23:35:43+02:00 File Permissions : rw-r--r-- File Type : JPEG MIME Type : image/jpeg JFIF Version : 1.01 Resolution Unit : inches X Resolution : 1 Y Resolution : 1 Image Width : 600 Image Height : 400 Encoding Process : Baseline DCT, Huffman coding Bits Per Sample : 8 Color Components : 3 Y Cb Cr Sub Sampling : YCbCr4:2:0 (2 2) Image Size : 600x400 macbook seo$ Adaugam ceva keywords, descriere, copyright: marian@pluto:~/work/seo$ exiftool \ > -Comment='Brandurile comercializate de compania RST LTD va asigura garantia calitatii' \ > -Keywords='calitate,nume produs,cod produs, exemplu ..' \ > -Copyright='RST LTD @ 2014' \ > imagine.jpg 1 image files updated Verificam informatiile introduse in imagine: marian@pluto:~/work/seo$ exiftool imagine.jpg ExifTool Version Number : 8.60 File Name : imagine.jpg Directory : . File Size : 342 kB File Modification Date/Time : 2014:01:16 21:58:28+00:00 File Permissions : rw-r--r-- File Type : JPEG MIME Type : image/jpeg JFIF Version : 1.01 Exif Byte Order : Big-endian (Motorola, MM) X Resolution : 1 Y Resolution : 1 Resolution Unit : None Y Cb Cr Positioning : Centered Copyright : RST LTD @ 2014 Current IPTC Digest : 5e9c360d0a9d4da80f86fbad65df409b Keywords : calitate,nume produs,cod produs, exemplu .. Application Record Version : 4 Comment : Brandurile comercializate de compania RST LTD va asigura garantia calitatii Image Width : 1600 Image Height : 1200 Encoding Process : Baseline DCT, Huffman coding Bits Per Sample : 8 Color Components : 3 Y Cb Cr Sub Sampling : YCbCr4:2:0 (2 2) Image Size : 1600x1200 Referinte: - ExifTool - Wikipedia, the free encyclopedia - ExifTool by Phil Harvey - exiftool Application Documentation Official Google Webmaster Central Blog: 1000 Words About Images Q: What happens to the EXIF, XMP and other metadata my images contain? A: We may use any information we find to help our users find what they’re looking for more easily. Additionally, information like EXIF data may be displayed in the right-hand sidebar of the interstitial page that appears when you click on an image. Q: Should I really submit an Image Sitemap? What are the benefits? A: Yes! Image Sitemaps help us learn about your new images and may also help us learn what the images are about. Nota: Chestia cred ca este buna daca cineva va fura tot timpul pozele facute de voi. Il puteti da in judecata si aveti dovada clara ca pozele sunt ale voastre (prin metadata info) Avantajul este ca puteti ridica un site web si in google images dupa anumite cuvinte cheie. Daca postati acest tutorial pe blog-ul vostru, va rog sa precizati sursa: https://rstforums.com/forum/80116-search-engine-optimization-pentru-imagini.rst
  5. FiletypeID is a tool designed to identify file types from their binary signatures. This simple application can help you to: identify what kind of file was sent to you via e-mail, aid in forensic analysis, support in file recovery, etc. FiletypeID is written in Python, based on PyQt4, TrIDLib and hachoir-metadata. +4697 file type definitions Download: https://filetypeid.googlecode.com/files/FiletypeID-0.2.1.zip https://filetypeid.googlecode.com/files/FiletypeID-0.2.1.7z [source code]
×
×
  • Create New...