Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CON-3132 Remake the inspector-image project (part2) #2731

Merged
merged 5 commits into from
Sep 28, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions subjects/cybersecurity/image-inspector/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ Images can contain more than just visual information, they often carry hidden da
The goal is to develop a tool using a programming language of your choice (Python is recommended) that can analyze images to extract hidden information. Specifically, your tool should:

1. **Extract Metadata**: Identify and display metadata from images, such as geolocation (latitude and longitude) where the photo was taken, the device used, and other relevant information.
2. **Detect Steganography**: Discover and extract any hidden PGP keys or other data concealed within the image using steganography techniques.
2. **Detect Steganography**: Discover and extract any hidden PGP keys within the image using steganography techniques.

By completing this project, you will:

Expand Down Expand Up @@ -101,7 +101,7 @@ Data saved in hidden_data.txt
```

**You will be provided with an example image to test your tool. Make sure your tool can successfully analyze this image and produce the expected outputs.**
The example image attached:
The example image attached:
[image-example1.jpeg](resources/image-example1.jpeg)
[image-example2.jpeg](resources/image-example2.jpeg)
[image-example3.jpeg](resources/image-example3.jpeg)
Expand Down
51 changes: 39 additions & 12 deletions subjects/cybersecurity/image-inspector/audit/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -22,8 +22,6 @@ Suggested role play questions include:
- How can this tool be used in real-life digital forensics or cybersecurity scenarios?
- What ethical considerations should be taken into account when analyzing images for hidden data?

###### Were the students able to answer all the questions?

###### Did the students demonstrate a thorough understanding of the concepts and technologies used in the project?

###### Were the students able to communicate effectively and justify their decisions and explain the knowledge behind this project?
Expand Down Expand Up @@ -64,33 +62,62 @@ $> image-inspector -m -o metadata.txt image-example1.jpeg
$> image-inspector -s -o hidden_data.txt image-example1.jpeg
```

###### Does the output correctly detect and extract any hidden PGP keys or other concealed information within the image?
###### Does the output correctly detect and extract any hidden PGP keys within the image?

###### Is the output stored in the file specified in the output parameter?

##### Testing with Images

**You will be provided with an example image to test the students tool. Feel free to test with other images.**
The example image attached:
The example image attached:
[image-example1.jpeg](resources/image-example1.jpeg)
[image-example2.jpeg](resources/image-example2.jpeg)
[image-example3.jpeg](resources/image-example3.jpeg)
[image-example4.jpeg](resources/image-example4.jpeg)

###### Test the tool with the provided example image and at least one other image to ensure the tool's robustness.

###### Does the tool produce accurate and expected results for different images?
```sh
$> image-inspector -s -o hidden_data1.txt image-example1.jpeg
Enter -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 01

mQENBGIwpy4BC<...>
=N8hc
-----END PGP PUBLIC KEY BLOCK-----
$>
```

```sh
$> image-inspector -s -o hidden_data2.txt image-example2.jpeg
-----BEGIN PGP PUBLIC KEY BLOCK-----
xo0EZuV9/AEEANRklh3<...>
=BhsK
-----END PGP PUBLIC KEY BLOCK-----
$>
```

##### Ensure that the student submission meets the project requirements:
```sh
$> image-inspector -s -o hidden_data3.txt image-example3.jpeg
-----BEGIN PGP PUBLIC KEY BLOCK-----
xo0EZuWBWQEEALrj<...>
=SXXm
-----END PGP PUBLIC KEY BLOCK-----
$>
```

1. **Functionality:** Does the tool perform its intended functions accurately (metadata extraction and steganography detection)?
2. **Data Accuracy:** Is the retrieved information accurate and relevant?
3. **Ethical Considerations:** Are there clear guidelines and warnings about the ethical and legal use of the tool?
4. **Usability:** Is the tool user-friendly and well-documented?
```sh
$> image-inspector -s -o hidden_data4.txt image-example4.jpeg
-----BEGIN PGP PUBLIC KEY BLOCK-----
xo0EZuWA9AE<...>
=/1dE
-----END PGP PUBLIC KEY BLOCK-----
$>
```

###### Did the tool design and implementation align with all the project requirements above?
> The results are cut. you can compare the beginning and the end of the results!

###### Were the students able to implement a functional and reliable tool that meets the project requirements?
###### Does the tool produce accurate and expected results for different images?

#### Bonus

Expand Down
Loading