Skip to content

Commit

Permalink
CON-3132 docs(image-inspector) fix the requested changes
Browse files Browse the repository at this point in the history
  • Loading branch information
zamazzal committed Sep 22, 2024
1 parent d5737ec commit 9b8c587
Show file tree
Hide file tree
Showing 6 changed files with 18 additions and 12 deletions.
19 changes: 11 additions & 8 deletions subjects/cybersecurity/image-inspector/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -84,15 +84,15 @@ OPTIONS:
#### Example Outputs:

```sh
$> image-inspector -m image-example.jpeg -o metadata.txt
$> image-inspector -m -o metadata.txt image-example1.jpeg
Lat/Lon: (13.731) / (-1.1373)
Device: Canon EOS 5D Mark III
Date: 2023-07-20 14:32:10
Data saved in metadata.txt
```

```sh
$> image-inspector -s image-example.jpeg -o hidden_data.txt
$> image-inspector -s -o hidden_data.txt image-example1.jpeg
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 01
...
Expand All @@ -101,22 +101,25 @@ Data saved in hidden_data.txt
```

**You will be provided with an example image to test your tool. Make sure your tool can successfully analyze this image and produce the expected outputs.**
The example image attached: [image-example.jpeg](resources/image-example.jpeg)
The example image attached:
[image-example1.jpeg](resources/image-example1.jpeg)
[image-example2.jpeg](resources/image-example2.jpeg)
[image-example3.jpeg](resources/image-example3.jpeg)
[image-example4.jpeg](resources/image-example4.jpeg)

#### Documentation

Create a `README.md` file that provides comprehensive documentation for your tool (prerequisites, setup, configuration, usage, ...). Ensure the documentation includes clear guidelines on the ethical use of the tool and warnings about the legal implications of analyzing images without permission.

### Bonus

If you complete the mandatory part successfully and still have time, consider adding the following features:

- **Additional Steganography Methods**: Implement detection for other steganography techniques beyond PGP keys.
- **Graphical User Interface (GUI)**: Create a user-friendly GUI using libraries like Tkinter or PyQT.
- **Facial Recognition**: Implement basic facial recognition features using OpenCV.

Challenge yourself!

### Documentation

Create a `README.md` file that provides comprehensive documentation for your tool (prerequisites, setup, configuration, usage, ...). Ensure the documentation includes clear guidelines on the ethical use of the tool and warnings about the legal implications of analyzing images without permission.

### Ethical and Legal Considerations

- **Get Permission**: Always obtain explicit permission before analyzing any image.
Expand Down
11 changes: 7 additions & 4 deletions subjects/cybersecurity/image-inspector/audit/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,6 @@ Suggested role play questions include:
- What is metadata in the context of digital images, and why is it important?
- How does steganography work, and what are its potential uses and risks?
- What challenges did you face while developing the Image Inspector tool, and how did you address them?
- How does the Image Inspector tool help in identifying hidden information within images?
- How can this tool be used in real-life digital forensics or cybersecurity scenarios?
- What ethical considerations should be taken into account when analyzing images for hidden data?

Expand Down Expand Up @@ -52,7 +51,7 @@ $> image-inspector --help
2. **Metadata Extraction Option:**

```sh
$> image-inspector -m image-example.jpeg -o metadata.txt
$> image-inspector -m -o metadata.txt image-example1.jpeg
```

###### Does the output correctly extract and display metadata such as geolocation, device information, and date/time?
Expand All @@ -62,7 +61,7 @@ $> image-inspector -m image-example.jpeg -o metadata.txt
3. **Steganography Detection Option:**

```sh
$> image-inspector -s image-example.jpeg -o hidden_data.txt
$> image-inspector -s -o hidden_data.txt image-example1.jpeg
```

###### Does the output correctly detect and extract any hidden PGP keys or other concealed information within the image?
Expand All @@ -72,7 +71,11 @@ $> image-inspector -s image-example.jpeg -o hidden_data.txt
##### Testing with Images

**You will be provided with an example image to test the students tool. Feel free to test with other images.**
The example image attached: [image-example.jpeg](../resources/image-example.jpeg)
The example image attached:
[image-example1.jpeg](resources/image-example1.jpeg)
[image-example2.jpeg](resources/image-example2.jpeg)
[image-example3.jpeg](resources/image-example3.jpeg)
[image-example4.jpeg](resources/image-example4.jpeg)

###### Test the tool with the provided example image and at least one other image to ensure the tool's robustness.

Expand Down
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.

0 comments on commit 9b8c587

Please sign in to comment.