{
    "id": "a915f46e-88b3-4f99-9062-50e7f96c77db",
    "name": "Extracting Metadata from Documents",
    "slug": "extracting-metadata-from-documents",
    "status": "published",
    "lab_type": "pta",
    "is_sample": false,
    "duration_in_seconds": 1800,
    "metadata": {
        "courses": [
            "225b7429-bd2e-433e-9168-318d861e97cf"
        ],
        "pta_sdn": "62",
        "pta_namespace": "my.ine",
        "learning_paths": [],
        "has_published_parent": true
    },
    "session": null,
    "company": "a491bc32-c056-4946-9169-cc053387bada",
    "created": "2022-03-30T02:47:18.825524Z",
    "modified": "2024-04-30T14:44:58.824600Z",
    "is_beta": false,
    "lab_objectives": [],
    "main_learning_area": "3e1aa06f-2e9f-4789-b50d-aa027ad8dcfa",
    "learning_areas": [
        {
            "id": "3e1aa06f-2e9f-4789-b50d-aa027ad8dcfa",
            "name": "Cyber Security",
            "slug": "cyber-security"
        }
    ],
    "categories": [],
    "tags": [],
    "difficulty": null,
    "is_web_access": false,
    "is_lab_experience": false,
    "is_featured": false,
    "cve": null,
    "severity": null,
    "year": null,
    "classification": null,
    "external_url": "",
    "solution_video": null,
    "explanation_video": null,
    "description": "# Scenario\n\nOur suspect seems very careful with leaving traces behind, especially when it comes to tracking him down and identifying locations visited. In this lab, we will use the evidence found on his USB, which we found recently in one of the motels he was staying in. We will focus this time on extracting and analyzing EXIF data instead of file headers like we did in previous labs. We will also see how useful EXIF data is when analyzing files and especially photos. Analyzing EXIF data is extremely important especially in our case since we want to track down our suspect. EXIF data analysis is not useful just for tracking, but if you have a child abuse/pornography case or any other case that involves digital photos.\n\n# Goals\n\n-   Extract and analyze EXIF data from files of interest\n\n-   Extract and analyze EXIF data from photos\n\n-   Identify GPS coordinates using EXIF data\n\n# What you will learn\n\n-   How to use different tools to analyze EXIF data\n\n-   How to identify location and time when a photo was taken\n\n-   Generate a report of your findings\n\n# Recommended tools\n\n-   **ExifReader**,  [www.takenet.or.jp/~ryuuji/minisoft/exifread/english/](http://www.takenet.or.jp/~ryuuji/minisoft/exifread/english/)\n\n-   **Exiftool**, <https://www.sno.phy.queensu.ca/~phil/exiftool/>",
    "description_html": "<h1>Scenario</h1>\n<p>Our suspect seems very careful with leaving traces behind, especially when it comes to tracking him down and identifying locations visited. In this lab, we will use the evidence found on his USB, which we found recently in one of the motels he was staying in. We will focus this time on extracting and analyzing EXIF data instead of file headers like we did in previous labs. We will also see how useful EXIF data is when analyzing files and especially photos. Analyzing EXIF data is extremely important especially in our case since we want to track down our suspect. EXIF data analysis is not useful just for tracking, but if you have a child abuse/pornography case or any other case that involves digital photos.</p>\n<h1>Goals</h1>\n<ul>\n<li>\n<p>Extract and analyze EXIF data from files of interest</p>\n</li>\n<li>\n<p>Extract and analyze EXIF data from photos</p>\n</li>\n<li>\n<p>Identify GPS coordinates using EXIF data</p>\n</li>\n</ul>\n<h1>What you will learn</h1>\n<ul>\n<li>\n<p>How to use different tools to analyze EXIF data</p>\n</li>\n<li>\n<p>How to identify location and time when a photo was taken</p>\n</li>\n<li>\n<p>Generate a report of your findings</p>\n</li>\n</ul>\n<h1>Recommended tools</h1>\n<ul>\n<li>\n<p><strong>ExifReader</strong>,  <a href=\"http://www.takenet.or.jp/~ryuuji/minisoft/exifread/english/\">www.takenet.or.jp/~ryuuji/minisoft/exifread/english/</a></p>\n</li>\n<li>\n<p><strong>Exiftool</strong>, <a href=\"https://www.sno.phy.queensu.ca/~phil/exiftool/\">https://www.sno.phy.queensu.ca/~phil/exiftool/</a></p>\n</li>\n</ul>",
    "tasks": "# Tasks\n\n## Task 1: Discover File Types using Exiftool\n\nIn this task, you are required to do a preliminary analysis of the files we found on the suspect's USB drive [you can find the suspect's files at **C:\\\\DFP\\\\Labs\\\\Module3\\\\Lab4**]. We want to discover the file type for each of the files you found. Use exiftool (regardless of platform) to accomplish the task.\n\n## Task 2: Analyzing File's EXIF Data\n\nOur next step in analyzing the evidence will be to extract EXIF data out of the files found and identify mainly each of the properties below:\n\n1.  Tool Version\n2.  File Size\n3.  File Creation Date\n4.  File Type\n5.  Producer\n6.  Creator and Author\n7.  Product\n\nAdd anything else you believe is necessary.\n\n## Task 3: Extracting Photos EXIF Data and Discovering GPS Coordinates\n\nOur next step is to try and track down the locations the suspect has visited and try to discover if there is a connection between each of them (CSI stuff). So, in this task, you are required to analyze EXIF data found in evidence photos [located at **C:\\\\DFP\\\\Labs\\\\Module3\\\\Lab4\\\\pics**] and answer the following questions:\n\n1.  What manufacturer does the camera belong to?\n2.  What is the camera model?\n3.  Was the flash used to take the photo or not?\n4.  If the camera was from a cellular phone, was it the rear or the front camera that was used?\n5.  What are the GPS coordinates of the camera at the time the photo was taken if any was found?\n6.  When was the photo taken?\n7.  What are the photo resolutions and was a thumbnail generated or not?\n\nAdd anything else you believe is necessary for the investigation.\n\n## Task 4: Generating a Data Sheet Report of Extracted Data\n\nWhen the extraction of the EXIF data and their analysis are done, it is now time to add all this information into a single data sheet that will accompany your final investigation report.",
    "tasks_html": "<h1>Tasks</h1>\n<h2>Task 1: Discover File Types using Exiftool</h2>\n<p>In this task, you are required to do a preliminary analysis of the files we found on the suspect's USB drive [you can find the suspect's files at <strong>C:\\DFP\\Labs\\Module3\\Lab4</strong>]. We want to discover the file type for each of the files you found. Use exiftool (regardless of platform) to accomplish the task.</p>\n<h2>Task 2: Analyzing File's EXIF Data</h2>\n<p>Our next step in analyzing the evidence will be to extract EXIF data out of the files found and identify mainly each of the properties below:</p>\n<ol>\n<li>Tool Version</li>\n<li>File Size</li>\n<li>File Creation Date</li>\n<li>File Type</li>\n<li>Producer</li>\n<li>Creator and Author</li>\n<li>Product</li>\n</ol>\n<p>Add anything else you believe is necessary.</p>\n<h2>Task 3: Extracting Photos EXIF Data and Discovering GPS Coordinates</h2>\n<p>Our next step is to try and track down the locations the suspect has visited and try to discover if there is a connection between each of them (CSI stuff). So, in this task, you are required to analyze EXIF data found in evidence photos [located at <strong>C:\\DFP\\Labs\\Module3\\Lab4\\pics</strong>] and answer the following questions:</p>\n<ol>\n<li>What manufacturer does the camera belong to?</li>\n<li>What is the camera model?</li>\n<li>Was the flash used to take the photo or not?</li>\n<li>If the camera was from a cellular phone, was it the rear or the front camera that was used?</li>\n<li>What are the GPS coordinates of the camera at the time the photo was taken if any was found?</li>\n<li>When was the photo taken?</li>\n<li>What are the photo resolutions and was a thumbnail generated or not?</li>\n</ol>\n<p>Add anything else you believe is necessary for the investigation.</p>\n<h2>Task 4: Generating a Data Sheet Report of Extracted Data</h2>\n<p>When the extraction of the EXIF data and their analysis are done, it is now time to add all this information into a single data sheet that will accompany your final investigation report.</p>",
    "published_date": "2020-10-20T15:32:26Z",
    "solutions": "# SOLUTIONS\n\n## Task 1: Discover File Types using Exiftool\n\nIn this part of the lab we are only required to extract the file type from the files we have on the suspect's USB [you can find the suspect's files at C:\\\\DFP\\\\Labs\\\\Module3\\\\Lab4]. I will be using Windows but you can use Linux to solve it easily too.\n\nLet's now leverage exiftool's -filetype flag to extract the file type from the suspect's files. Simply open a cmd.exe terminal and execute the below, against each file in the Lab4 folder.\n\n```\n# cd C:\\DFP\\Tools\\Metadata\n# \"exiftool(-k).exe\" -filetype C:\\DFP\\Labs\\Module3\\Lab4\\2D3Fa2a\n```\n\n**Note:** the output has been modified to fit this report without affecting the final understanding required.\n\n2D3Fa2a File Type   :   PDF\n\nAW3DXW  File Type   :   JPEG\n\nMx\\#234 File Type   :   PPT\n\nXFaWxVa File Type   :   PDF\n\nZC2f2d2 File Type   :   XLSX\n\nAlternatively, on Linux, you could do the following, to speed things up:\n\n```\n# find -type f -print -exec exiftool -filetype {} \\;\n```\n\nThe command above searches for all files within the current working directory and prints the name of the file that was filtered based on the results of the exiftool utility (those results contain the file type). If you noticed, we asked exiftool to specifically print the File Type and not all of the EXIF information. So, as you can see, by now we have two basic ways of identifying a file; one using the Linux \"file\" command and the other using the \"exiftool\" utility.\n\n## Task 2: Analyzing File's EXIF Data\n\nIn this part, we were asked to extract the Tool Version, File Size, File Creation Date, File Type, Producer, Creator and Author, and finally the Product information out of the files we found. For understanding purposes, we will focus on the five different files below:\n\n1.  2D3Fa2a\n2.  AW3DXW\n3.  Mx\\#234\n4.  XFaWxVa\n5.  and ZC2f2d2\n\nThe basic way of using the exiftool utility on Windows, is similar to the command used below:\n\n```\n# \"exiftool(-k).exe\" C:\\DFP\\Labs\\Module3\\Lab4\\2D3Fa2a\n```\n\nAs we saw in the previous part of the lab, this was a PDF file, and we found the following interesting information:\n\n![1](https://assets.ine.com/content/ptp/lab_4_extracting_metadata_from_documents/1.png)\n\nFrom the snapshot, we can gather the following useful information:\n\n1. File Size: \t\t\t\t\t\t\t      140 KB\n2. File Creation Date:                 2017:08:11 04:45:30-07:00\n3. File Type:                                 PDF\n4. Producer:                                Microsoft\u00ae Word 2016\n5. Creator and Author:              Ali Hadi\n6. Product:                                  Microsoft\u00ae Word 2016\n\nNow, let us move on to checking the rest of the files and see what we found in each:\n\n```\n# \"exiftool(-k).exe\" C:\\DFP\\Labs\\Module3\\Lab4\\AW3DXW\n```\n\nIt was found that this is a JPEG image file with lots of useful information. Let us write down the basics:\n\n1.  File Size: \t\t\t\t\t\t\t\t\t\t**859 KB**\n2.  File Creation Date:                       **2008:03:14 13:59:26.54**\n3.  File Type:                                       **JPEG**\n4.  Creator:                                        **Corbis**\n\nThose were only the basics, but we found other useful information such as the following:\n\n1.  Since we are dealing with an image, we found an \"**Artist**\" tag, not an author, and in this file, it also leads to \"**Corbis**.\"\n2.  The \"Thumbnail Offset\" tag is extremely useful. The thumbnail could be used to check whether the original image was modified or not. So, we can extract it and compare it with the original image.\n3.  The \"**XMP Toolkit**\" tag describes the toolkit used, which we found here was \"**Adobe XMP Core 4.2-c020 1.124078, Tue Sep 11 2007 23:21:40**\".\n4.  We also found the \"**Date/Time Digitized**\" which was \"**2008:03:14 11:31:48.98-07:00**\". This gives us an idea when this image was stored in its digital format.\n5.  Maybe the \"**Copyright Notice**\" is useful too in cases related to photos. Anyway, we found the \"**\u00a9 Corbis. All Rights Reserved.\"** in this image.\n6.  We also found a \"**URL**\" within this image, which was \"**http://pro.corbis.com/search/searchresults.asp?txt=42-17167222&openImage=42-17167222**\".\n7.  Finally, we can see the image width and height, which are **1024** and **768** respectively.\n\nLet us move on to our third file.\n\n```\n# \"exiftool(-k).exe\" C:\\DFP\\Labs\\Module3\\Lab4\\Mx#234\n```\n\nThe results could be seen in the snapshot below.\n\n![2](https://assets.ine.com/content/ptp/lab_4_extracting_metadata_from_documents/2.png)\n\nHere we have the following useful information:\n\n1.  File Size: \t\t\t\t\t\t\t\t\t\t\t\t**381 KB**\n2.  File Creation Date:                               **2017:08:11 12:34:53**\n3.  Modification Date:                               **2017:08:11 12:34:57**\n4.  File Type:                                               **PPT**\n5.  Author:\n\nFirst, the \"**Title**\" tag shows \"**PowerPoint Presentation,**\" maybe not very useful, but it is good to check too. The \"**Software**\" used to create it was \"**Microsoft Office PowerPoint,**\" has no hidden slides and the \"**Presentation Target**\" is a \"**Widescreen.**\" Another important detail here is that we could also see the file was last modified by the author himself. So, the \"**Last Modified By**\" tag could come handy in other investigations, keep that in mind.\n\nLet us check the fourth file:\n\n```\n# \"exiftool(-k).exe\" C:\\DFP\\Labs\\Module3\\Lab4\\XFaWxVa\n```\n\nHere we have the following useful information:\n\n1.  File Size: \t\t\t\t\t                    **140 KB**\n2.  File Creation Date:                       **2017:08:11 05:32:41-07:00**\n3.  Modification Date:                       **2017:08:11 05:32:41-07:00**\n4.  File Type:                                       **PDF**\n5.  Software:                                      **Microsoft Office Word**\n6.  Pages:                                           **1**\n\nNow, a 1-page document might not always be malicious, but for example if the pdf document was supposed to be a proposal, then a one-page document is truly \"**suspicious**\".\n\nOur final file is:\n\n```\n# \"exiftool(-k).exe\" C:\\DFP\\Labs\\Module3\\Lab4\\ZC2f2d2\n```\n\nHere we have the following useful information:\n\n1.  File Size: \t\t\t\t\t\t\t\t\t\t\t\t\t**9.7 KB**\n2.  File Creation Date:                                   **2006:09:16 00:00:00Z**\n3.  Modification Date:                                   **2017:08:11 12:36:15Z**\n4.  File Type:                                                   **XLSX**\n5.  Application:                                              **Microsoft Excel**\n6.  Sheets:                                                      **2 (Sheet1 and Sheet2)**\n\n## Task 3: Extracting Photos EXIF Data and Discovering GPS Coordinates\n\nFor this task, I won't be using the \"**exiftool**\" utility to solve the task, but another tool named \"**ExifReader**\" [located at **C:\\\\DFP\\\\Tools\\\\Metadata\\\\exifr300_e**]. I'm going to do that for two reasons; the first is that there always will be different ways and tools to solve a problem, and second, is to introduce you to **ExifReader**.\n\nIn this task, we have a couple of photos [located at **C:\\\\DFP\\\\Labs\\\\Module3\\\\Lab4\\\\pics**] and we want to get an idea of the following:\n\n1.  What manufacturer does the camera belong to?\n2.  What is the camera model?\n3.  Was the flash used to take the photo or not?\n4.  If the camera was from a cellular phone, was it the rear or the front camera that was used?\n5.  What are the GPS coordinates of the camera at the time the photo was taken if any was found?\n6.  When was the photo taken?\n7.  What are the photo resolutions and was a thumbnail generated or not?\n\nSo, let us get started. We discovered six photos, let us check each one of them and see. Using ExifReader is very simple, all you need to do is either use the \"open\" button and navigate to the location where the photo of interest is found and select it, or just drag-and-drop the photo on top of the application and it will open it for you.\n\n**[IMPORTANT NOTE:]**\n\nThe photos used in this task are only used to help understand the importance of EXIF information found in photos. The photos and people names used do not derive from a real crime or investigation. No harm is meant, this is for educational purposes only.\n\nOpening the first photo \"DSCN0025.jpg\":\n\n![3](https://assets.ine.com/content/ptp/lab_4_extracting_metadata_from_documents/3.png)\n\nFrom the snapshots above, we can clearly answer the questions required:\n\n1.  From the \"**Make**\" tag, we can identify the camera manufacturer:  **Nikon**\n\n2.  From the \"**Model**\" tag, we can identify the camera model: **COOLPIX P6000**\n\n3.  The \"**Flash**\" tag gives us an idea whether the flash was used or not, here it wasn't\n\n4.  It doesn't seem that this is a camera of a cellular phone\n\nNow regarding GPS information, let us check that part:\n\n![4](https://assets.ine.com/content/ptp/lab_4_extracting_metadata_from_documents/4.png)\n\n5.  Based on the \"GPS Latitude\" tag, we found: **\"43 deg 2806.114'\" North**\n\n6.  Based on the \"GPS Longitude\" tag, we found **\"11 deg 5253.8859999'\" East**\n\n7.  The photo was taken at \"**2008:10:23 14:41:49**\" and yes there was a thumbnail embedded within this photo.\n\n8.  The width and height of the photo are \"**640x480**\"\n\nIf you take these GPS coordinates and use Google Maps, you could identify the location where the photo was taken. This is extremely helpful in crime scenes or in cases where photos could be used to locate the suspect.\n\nNow, if you noticed when checking the results, there are tags or item names that are unknown. This I believe is due to the fact that the tool has not been updated for a very long time. Now if we go back to exiftool and run it against our photo, we shall get more clear details and results.\n\nYou can save all the information you extracted to a Text or CSV file as seen in the snapshot below:\n\n![5](https://assets.ine.com/content/ptp/lab_4_extracting_metadata_from_documents/5.png)\n\nLet us move on to another sample.\n\nLet us open another sample and check it out. This time I am going to open the photo \"**iphone_hdr_NO.jpg**\":\n\n![6](https://assets.ine.com/content/ptp/lab_4_extracting_metadata_from_documents/6.png)\n\nFrom the photos, we can see the following:\n\n1.  Image **ImageWidth** and **ImageHeight** are **3264** and **2448** respectively.\n\n2.  The camera manufacturer is **Apple**, and its Model is **iPhone 6**.\n\n3.  The **Software** used is **8.3**.\n\n4.  The photo was created on **2015:04:10 20:12:23**, based on the **DateTimeOriginal** tag.\n\n5.  The flash was not used here too.\n\nNow let us check the GPS and additional information from the second snapshot:\n\n![7](https://assets.ine.com/content/ptp/lab_4_extracting_metadata_from_documents/7.png)\n\n6.  The GPS coordinates seem to be Latitude **\"40 deg 2649.1'\" North**, and Longitude **\"3 deg 4329.11'\" West**.\n\n7.  We can see that this photo was taken from a **back camera**.\n\nBefore I move to solving Task \\#4, I want to show you what I found when opening the **image02206.jpg** using ExifReader:\n\n![8](https://assets.ine.com/content/ptp/lab_4_extracting_metadata_from_documents/8.png)\n\nYes, as you noticed, I was not able to extract anything useful from the photo and if I didn't check another tool, I would have been fooled that this photo does not contain any EXIF data, while in reality it does. This is another example of why you should not rely on a single tool and it is far better to verify your work using another approach or tool.\n\nRun exiftool against **image02206.jpg** and see for yourself...\n\n## Task 4: Generating a Data Sheet Report of Extracted Data\n\nWe have finished analyzing the evidence and let's say we want to generate a report with all the EXIF data we found within each file. We can do this using a lots of ways, and I already mentioned one in task \\#3 while using the ExifReader application. This time we will be generating reports using the exiftool utility.\n\nThe first approach is to generate a single report for each photo we have. This could be done using the following command (from within the photo's directory):\n\n```\n# \"C:\\DFP\\Tools\\Metadata\\exiftool(-k).exe\" -a -u -g1 -w %f.txt *.jpg\n```\n\nThis will produce the following output:\n\n```\n6 image files read\n6 output files created\n```\n\nAnd if you check the files, you will find that a .txt file has been created having the same file name as the one of each photo.\n\nFinally, let us generate a single report with all the information within it, specifically let us make it a Comma-Separated Value (CSV) file. We could easily do that with the exiftool utility like this:\n\n```\n# \"C:\\DFP\\Tools\\Metadata\\exiftool(-k).exe\" *.jpg -csv > report.csv\n```\n\nThis will produce a single file called \"report.csv\" that holds all the EXIF data found in each photo. You can use your favorite reader (ex: Microsoft Excel) to open and analyze the contents.\n\n## References:\n\nCode Page, <https://en.wikipedia.org/wiki/Code_page>",
    "solutions_html": "<h1>SOLUTIONS</h1>\n<h2>Task 1: Discover File Types using Exiftool</h2>\n<p>In this part of the lab we are only required to extract the file type from the files we have on the suspect's USB [you can find the suspect's files at C:\\DFP\\Labs\\Module3\\Lab4]. I will be using Windows but you can use Linux to solve it easily too.</p>\n<p>Let's now leverage exiftool's -filetype flag to extract the file type from the suspect's files. Simply open a cmd.exe terminal and execute the below, against each file in the Lab4 folder.</p>\n<pre class=\"codehilite\"><code># cd C:\\DFP\\Tools\\Metadata\n# \"exiftool(-k).exe\" -filetype C:\\DFP\\Labs\\Module3\\Lab4\\2D3Fa2a</code></pre>\n\n<p><strong>Note:</strong> the output has been modified to fit this report without affecting the final understanding required.</p>\n<p>2D3Fa2a File Type   :   PDF</p>\n<p>AW3DXW  File Type   :   JPEG</p>\n<p>Mx#234 File Type   :   PPT</p>\n<p>XFaWxVa File Type   :   PDF</p>\n<p>ZC2f2d2 File Type   :   XLSX</p>\n<p>Alternatively, on Linux, you could do the following, to speed things up:</p>\n<pre class=\"codehilite\"><code># find -type f -print -exec exiftool -filetype {} \\;</code></pre>\n\n<p>The command above searches for all files within the current working directory and prints the name of the file that was filtered based on the results of the exiftool utility (those results contain the file type). If you noticed, we asked exiftool to specifically print the File Type and not all of the EXIF information. So, as you can see, by now we have two basic ways of identifying a file; one using the Linux \"file\" command and the other using the \"exiftool\" utility.</p>\n<h2>Task 2: Analyzing File's EXIF Data</h2>\n<p>In this part, we were asked to extract the Tool Version, File Size, File Creation Date, File Type, Producer, Creator and Author, and finally the Product information out of the files we found. For understanding purposes, we will focus on the five different files below:</p>\n<ol>\n<li>2D3Fa2a</li>\n<li>AW3DXW</li>\n<li>Mx#234</li>\n<li>XFaWxVa</li>\n<li>and ZC2f2d2</li>\n</ol>\n<p>The basic way of using the exiftool utility on Windows, is similar to the command used below:</p>\n<pre class=\"codehilite\"><code># \"exiftool(-k).exe\" C:\\DFP\\Labs\\Module3\\Lab4\\2D3Fa2a</code></pre>\n\n<p>As we saw in the previous part of the lab, this was a PDF file, and we found the following interesting information:</p>\n<p><img alt=\"1\" src=\"https://assets.ine.com/content/ptp/lab_4_extracting_metadata_from_documents/1.png\" /></p>\n<p>From the snapshot, we can gather the following useful information:</p>\n<ol>\n<li>File Size:                                 140 KB</li>\n<li>File Creation Date:                 2017:08:11 04:45:30-07:00</li>\n<li>File Type:                                 PDF</li>\n<li>Producer:                                Microsoft\u00ae Word 2016</li>\n<li>Creator and Author:              Ali Hadi</li>\n<li>Product:                                  Microsoft\u00ae Word 2016</li>\n</ol>\n<p>Now, let us move on to checking the rest of the files and see what we found in each:</p>\n<pre class=\"codehilite\"><code># \"exiftool(-k).exe\" C:\\DFP\\Labs\\Module3\\Lab4\\AW3DXW</code></pre>\n\n<p>It was found that this is a JPEG image file with lots of useful information. Let us write down the basics:</p>\n<ol>\n<li>File Size:                                      <strong>859 KB</strong></li>\n<li>File Creation Date:                       <strong>2008:03:14 13:59:26.54</strong></li>\n<li>File Type:                                       <strong>JPEG</strong></li>\n<li>Creator:                                        <strong>Corbis</strong></li>\n</ol>\n<p>Those were only the basics, but we found other useful information such as the following:</p>\n<ol>\n<li>Since we are dealing with an image, we found an \"<strong>Artist</strong>\" tag, not an author, and in this file, it also leads to \"<strong>Corbis</strong>.\"</li>\n<li>The \"Thumbnail Offset\" tag is extremely useful. The thumbnail could be used to check whether the original image was modified or not. So, we can extract it and compare it with the original image.</li>\n<li>The \"<strong>XMP Toolkit</strong>\" tag describes the toolkit used, which we found here was \"<strong>Adobe XMP Core 4.2-c020 1.124078, Tue Sep 11 2007 23:21:40</strong>\".</li>\n<li>We also found the \"<strong>Date/Time Digitized</strong>\" which was \"<strong>2008:03:14 11:31:48.98-07:00</strong>\". This gives us an idea when this image was stored in its digital format.</li>\n<li>Maybe the \"<strong>Copyright Notice</strong>\" is useful too in cases related to photos. Anyway, we found the \"<strong>\u00a9 Corbis. All Rights Reserved.\"</strong> in this image.</li>\n<li>We also found a \"<strong>URL</strong>\" within this image, which was \"<strong>http://pro.corbis.com/search/searchresults.asp?txt=42-17167222&amp;openImage=42-17167222</strong>\".</li>\n<li>Finally, we can see the image width and height, which are <strong>1024</strong> and <strong>768</strong> respectively.</li>\n</ol>\n<p>Let us move on to our third file.</p>\n<pre class=\"codehilite\"><code># \"exiftool(-k).exe\" C:\\DFP\\Labs\\Module3\\Lab4\\Mx#234</code></pre>\n\n<p>The results could be seen in the snapshot below.</p>\n<p><img alt=\"2\" src=\"https://assets.ine.com/content/ptp/lab_4_extracting_metadata_from_documents/2.png\" /></p>\n<p>Here we have the following useful information:</p>\n<ol>\n<li>File Size:                                              <strong>381 KB</strong></li>\n<li>File Creation Date:                               <strong>2017:08:11 12:34:53</strong></li>\n<li>Modification Date:                               <strong>2017:08:11 12:34:57</strong></li>\n<li>File Type:                                               <strong>PPT</strong></li>\n<li>Author:</li>\n</ol>\n<p>First, the \"<strong>Title</strong>\" tag shows \"<strong>PowerPoint Presentation,</strong>\" maybe not very useful, but it is good to check too. The \"<strong>Software</strong>\" used to create it was \"<strong>Microsoft Office PowerPoint,</strong>\" has no hidden slides and the \"<strong>Presentation Target</strong>\" is a \"<strong>Widescreen.</strong>\" Another important detail here is that we could also see the file was last modified by the author himself. So, the \"<strong>Last Modified By</strong>\" tag could come handy in other investigations, keep that in mind.</p>\n<p>Let us check the fourth file:</p>\n<pre class=\"codehilite\"><code># \"exiftool(-k).exe\" C:\\DFP\\Labs\\Module3\\Lab4\\XFaWxVa</code></pre>\n\n<p>Here we have the following useful information:</p>\n<ol>\n<li>File Size:                                      <strong>140 KB</strong></li>\n<li>File Creation Date:                       <strong>2017:08:11 05:32:41-07:00</strong></li>\n<li>Modification Date:                       <strong>2017:08:11 05:32:41-07:00</strong></li>\n<li>File Type:                                       <strong>PDF</strong></li>\n<li>Software:                                      <strong>Microsoft Office Word</strong></li>\n<li>Pages:                                           <strong>1</strong></li>\n</ol>\n<p>Now, a 1-page document might not always be malicious, but for example if the pdf document was supposed to be a proposal, then a one-page document is truly \"<strong>suspicious</strong>\".</p>\n<p>Our final file is:</p>\n<pre class=\"codehilite\"><code># \"exiftool(-k).exe\" C:\\DFP\\Labs\\Module3\\Lab4\\ZC2f2d2</code></pre>\n\n<p>Here we have the following useful information:</p>\n<ol>\n<li>File Size:                                                  <strong>9.7 KB</strong></li>\n<li>File Creation Date:                                   <strong>2006:09:16 00:00:00Z</strong></li>\n<li>Modification Date:                                   <strong>2017:08:11 12:36:15Z</strong></li>\n<li>File Type:                                                   <strong>XLSX</strong></li>\n<li>Application:                                              <strong>Microsoft Excel</strong></li>\n<li>Sheets:                                                      <strong>2 (Sheet1 and Sheet2)</strong></li>\n</ol>\n<h2>Task 3: Extracting Photos EXIF Data and Discovering GPS Coordinates</h2>\n<p>For this task, I won't be using the \"<strong>exiftool</strong>\" utility to solve the task, but another tool named \"<strong>ExifReader</strong>\" [located at <strong>C:\\DFP\\Tools\\Metadata\\exifr300_e</strong>]. I'm going to do that for two reasons; the first is that there always will be different ways and tools to solve a problem, and second, is to introduce you to <strong>ExifReader</strong>.</p>\n<p>In this task, we have a couple of photos [located at <strong>C:\\DFP\\Labs\\Module3\\Lab4\\pics</strong>] and we want to get an idea of the following:</p>\n<ol>\n<li>What manufacturer does the camera belong to?</li>\n<li>What is the camera model?</li>\n<li>Was the flash used to take the photo or not?</li>\n<li>If the camera was from a cellular phone, was it the rear or the front camera that was used?</li>\n<li>What are the GPS coordinates of the camera at the time the photo was taken if any was found?</li>\n<li>When was the photo taken?</li>\n<li>What are the photo resolutions and was a thumbnail generated or not?</li>\n</ol>\n<p>So, let us get started. We discovered six photos, let us check each one of them and see. Using ExifReader is very simple, all you need to do is either use the \"open\" button and navigate to the location where the photo of interest is found and select it, or just drag-and-drop the photo on top of the application and it will open it for you.</p>\n<p><strong>[IMPORTANT NOTE:]</strong></p>\n<p>The photos used in this task are only used to help understand the importance of EXIF information found in photos. The photos and people names used do not derive from a real crime or investigation. No harm is meant, this is for educational purposes only.</p>\n<p>Opening the first photo \"DSCN0025.jpg\":</p>\n<p><img alt=\"3\" src=\"https://assets.ine.com/content/ptp/lab_4_extracting_metadata_from_documents/3.png\" /></p>\n<p>From the snapshots above, we can clearly answer the questions required:</p>\n<ol>\n<li>\n<p>From the \"<strong>Make</strong>\" tag, we can identify the camera manufacturer:  <strong>Nikon</strong></p>\n</li>\n<li>\n<p>From the \"<strong>Model</strong>\" tag, we can identify the camera model: <strong>COOLPIX P6000</strong></p>\n</li>\n<li>\n<p>The \"<strong>Flash</strong>\" tag gives us an idea whether the flash was used or not, here it wasn't</p>\n</li>\n<li>\n<p>It doesn't seem that this is a camera of a cellular phone</p>\n</li>\n</ol>\n<p>Now regarding GPS information, let us check that part:</p>\n<p><img alt=\"4\" src=\"https://assets.ine.com/content/ptp/lab_4_extracting_metadata_from_documents/4.png\" /></p>\n<ol>\n<li>\n<p>Based on the \"GPS Latitude\" tag, we found: <strong>\"43 deg 2806.114'\" North</strong></p>\n</li>\n<li>\n<p>Based on the \"GPS Longitude\" tag, we found <strong>\"11 deg 5253.8859999'\" East</strong></p>\n</li>\n<li>\n<p>The photo was taken at \"<strong>2008:10:23 14:41:49</strong>\" and yes there was a thumbnail embedded within this photo.</p>\n</li>\n<li>\n<p>The width and height of the photo are \"<strong>640x480</strong>\"</p>\n</li>\n</ol>\n<p>If you take these GPS coordinates and use Google Maps, you could identify the location where the photo was taken. This is extremely helpful in crime scenes or in cases where photos could be used to locate the suspect.</p>\n<p>Now, if you noticed when checking the results, there are tags or item names that are unknown. This I believe is due to the fact that the tool has not been updated for a very long time. Now if we go back to exiftool and run it against our photo, we shall get more clear details and results.</p>\n<p>You can save all the information you extracted to a Text or CSV file as seen in the snapshot below:</p>\n<p><img alt=\"5\" src=\"https://assets.ine.com/content/ptp/lab_4_extracting_metadata_from_documents/5.png\" /></p>\n<p>Let us move on to another sample.</p>\n<p>Let us open another sample and check it out. This time I am going to open the photo \"<strong>iphone_hdr_NO.jpg</strong>\":</p>\n<p><img alt=\"6\" src=\"https://assets.ine.com/content/ptp/lab_4_extracting_metadata_from_documents/6.png\" /></p>\n<p>From the photos, we can see the following:</p>\n<ol>\n<li>\n<p>Image <strong>ImageWidth</strong> and <strong>ImageHeight</strong> are <strong>3264</strong> and <strong>2448</strong> respectively.</p>\n</li>\n<li>\n<p>The camera manufacturer is <strong>Apple</strong>, and its Model is <strong>iPhone 6</strong>.</p>\n</li>\n<li>\n<p>The <strong>Software</strong> used is <strong>8.3</strong>.</p>\n</li>\n<li>\n<p>The photo was created on <strong>2015:04:10 20:12:23</strong>, based on the <strong>DateTimeOriginal</strong> tag.</p>\n</li>\n<li>\n<p>The flash was not used here too.</p>\n</li>\n</ol>\n<p>Now let us check the GPS and additional information from the second snapshot:</p>\n<p><img alt=\"7\" src=\"https://assets.ine.com/content/ptp/lab_4_extracting_metadata_from_documents/7.png\" /></p>\n<ol>\n<li>\n<p>The GPS coordinates seem to be Latitude <strong>\"40 deg 2649.1'\" North</strong>, and Longitude <strong>\"3 deg 4329.11'\" West</strong>.</p>\n</li>\n<li>\n<p>We can see that this photo was taken from a <strong>back camera</strong>.</p>\n</li>\n</ol>\n<p>Before I move to solving Task #4, I want to show you what I found when opening the <strong>image02206.jpg</strong> using ExifReader:</p>\n<p><img alt=\"8\" src=\"https://assets.ine.com/content/ptp/lab_4_extracting_metadata_from_documents/8.png\" /></p>\n<p>Yes, as you noticed, I was not able to extract anything useful from the photo and if I didn't check another tool, I would have been fooled that this photo does not contain any EXIF data, while in reality it does. This is another example of why you should not rely on a single tool and it is far better to verify your work using another approach or tool.</p>\n<p>Run exiftool against <strong>image02206.jpg</strong> and see for yourself...</p>\n<h2>Task 4: Generating a Data Sheet Report of Extracted Data</h2>\n<p>We have finished analyzing the evidence and let's say we want to generate a report with all the EXIF data we found within each file. We can do this using a lots of ways, and I already mentioned one in task #3 while using the ExifReader application. This time we will be generating reports using the exiftool utility.</p>\n<p>The first approach is to generate a single report for each photo we have. This could be done using the following command (from within the photo's directory):</p>\n<pre class=\"codehilite\"><code># \"C:\\DFP\\Tools\\Metadata\\exiftool(-k).exe\" -a -u -g1 -w %f.txt *.jpg</code></pre>\n\n<p>This will produce the following output:</p>\n<pre class=\"codehilite\"><code>6 image files read\n6 output files created</code></pre>\n\n<p>And if you check the files, you will find that a .txt file has been created having the same file name as the one of each photo.</p>\n<p>Finally, let us generate a single report with all the information within it, specifically let us make it a Comma-Separated Value (CSV) file. We could easily do that with the exiftool utility like this:</p>\n<pre class=\"codehilite\"><code># \"C:\\DFP\\Tools\\Metadata\\exiftool(-k).exe\" *.jpg -csv &gt; report.csv</code></pre>\n\n<p>This will produce a single file called \"report.csv\" that holds all the EXIF data found in each photo. You can use your favorite reader (ex: Microsoft Excel) to open and analyze the contents.</p>\n<h2>References:</h2>\n<p>Code Page, <a href=\"https://en.wikipedia.org/wiki/Code_page\">https://en.wikipedia.org/wiki/Code_page</a></p>",
    "flags": [],
    "min_points_to_pass": null,
    "access_type": "default",
    "user_status": "unstarted",
    "user_lab_status": null,
    "user_status_modified": null,
    "user_flags": [],
    "global_running_session": null
}