SlideShare a Scribd company logo
1 of 19
Security Research Institute
Edith Cowan University
Metadata : What is Unseen
Professor Craig Valli
Security Research Institute
SIG 29th April, 2013
Security Research Institute
Edith Cowan University
What is it in this context
• Data in various forms that are embedded in a
digital artefact or stream, typically unseen by the
user. Including but not limited to
– Your email address
– Watermarks, logos etc
– Server Drive mappings
– Notes and edits (since thought to be deleted)
– Your geolocation at time of save or capture
– Cookies, web application specific data
Security Research Institute
Edith Cowan University
Why not remove?
• What do you think feeds search engines?
• It can be very useful for internal systems to
search on attributes of documents
• Can be used to prove provenance of a document
• Can be used to provide an avenue for targetted
deception
Security Research Institute
Edith Cowan University
Why remove?
• It makes good sense from a security
perspective, minimal information leakage is
optimal
• Because in some countries you are leaving
yourself open to litigation and or breaches of
law (US HIPPA, Privacy Acts, Data Protection)
distributing documents with this data in them
Security Research Institute
Edith Cowan University
TCP/IP Stacks, Operating Systems
• NMAP, p0f are network mappers that work by
looking at the flags in your TCP/IP transmissions.
They can reliably fingerprint
– Your device
– Your operating system
– Your patch level of operating system
Security Research Institute
Edith Cowan University
Browsers
• The addition of various plug-ins to a browser, in
combination with IP numbers used, platform
identifiers in the browser and the ubiquitous
cookie can make browsers easy to uniquely
identify
– Mozilla/5.0 (Linux; U; Android 2.2; en-gb; GT-P1000 Build/FROYO) AppleWebKit/533.1
(KHTML, like Gecko) Version/4.0 Mobile Safari/533.1
– Mozilla/5.0 (Linux; U; Android 2.2; en-ca; SGH-T959D Build/FROYO) AppleWebKit/533.1
(KHTML, like Gecko) Version/4.0 Mobile Safari/533.1
– Mozilla/5.0 (Linux; U; Android 2.2; en-gb; GT-P1000 Build/FROYO) AppleWebKit/533.1
(KHTML, like Gecko) Version/4.0 Mobile Safari/533.1
– Mozilla/5.0 (Linux; U; Android 2.0.1; en-us; Droid Build/ESD56) AppleWebKit/530.17
(KHTML, like Gecko) Version/4.0 Mobile Safari/530.17
Security Research Institute
Edith Cowan University
Word Document Metadata
• Comments, revision marks from tracked
changes, versions, and ink annotations
• Headers, footers, and watermarks
• Document server properties
• Email addresses
• Usernames (ADS etc)
• Hidden text (formatted as)
Security Research Institute
Edith Cowan University
PDF
• Same same as before with Word plus...
– Encryption and user access settings
– Signature tags – location, signing authority, type of
signing etc
– Lets not forget executables
– Can keep a full history of metadata in the file i.e just
changing does not erase...
Security Research Institute
Edith Cowan University
Geotagging
• The location data is typically
stored within the EXIF records for
the image using the EXIF Global
Positioning System sub-IFD that
uses the TIFF Private Tag 0x882
• Or the application generates the
data using a combination of
sources to locate e.g GPS and
Wireless access points
Security Research Institute
Edith Cowan University
EXIF
• The Exchangeable Image File format (EXIF) is a
published industry specification for the image file
format used by digital cameras
• There are over 200 plus identifiers/tags, geo-
location, device, serial number etc
Security Research Institute
Edith Cowan University
EXIF
Security Research Institute
Edith Cowan University
Social Media...
• Most of these services are “free” in exchange for
your data and metadata touch points. Just as in
real world no free lunch in cyberspace.
• Many of these services give full feeds of their
data streams to developers (anyone)
• Some of them rely on you to have turned on
GPS/geolocation to access the service i.e no geo
no service or you are just “checking in”
Security Research Institute
Edith Cowan University
Twitter – 140 characters not!
•Links to previous tweets
•Authors username
•Authors screename
•Authors biography
•Authors location
•Timezone
•PlaceID, Printable Name, URL,
Type, Bounding Box, Country of
place tweet was made
•Application that sent the tweet
Security Research Institute
Edith Cowan University
Google...
Security Research Institute
Edith Cowan University
Third Party Service Providers
• Various service
providers are now
developing services
that fingerprint your
devices and you!
• All perfectly legal
, drawn from
metadata and other
sources.
Security Research Institute
Edith Cowan University
Some analysis tools
• Metapicz – Google App - is one example of an
online based tools that allow extraction data
• Geosetter – http://www.geosetter.de/en/
Windows tool to edit/view Geo and other
attributes
• FOCA – harvester and analyser for metadata
from websites
• GeoIntelligence – home grown...
Security Research Institute
Edith Cowan University
Solutions
• Make sure you turn off geo-location on your
devices...unless you want to be tracked
• Strip out metadata using a cleanser before
sending documents in email or storing on
websites, unless you’re setting honeyfiles..
• Use your browsers in anonymous modes on all
your devices or set different browser-id strings
• Be careful what extensions in use on browsers
• Use some of the VM based anonymisers
Security Research Institute
Edith Cowan University
Software and Resources
• Office 2010+ - Document Inspector
• OpenOffice – http://oometaextractor.codeplex.com/
• Removing Sensitive Data for PDF
http://tv.adobe.com/watch/learn-acrobat-x/removing-
sensitive-information/
Security Research Institute
Edith Cowan University
References and Resources
• Official 2.3 EXIF
http://www.cipa.jp/english/hyoujunka/kikaku/pdf/DC-008-
2012_E.pdf
• EXIF Tag list
http://www.sno.phy.queensu.ca/~phil/exiftool/TagNames/EXIF.ht
ml
• Hidden Data and Metadata in Adobe PDF Files
http://www.nsa.gov/ia/_files/app/pdf_risks.pdf
• Official PDF specification -
http://www.adobe.com/devnet/pdf/pdf_reference.html

More Related Content

Viewers also liked

TERMS THAT WOULD MAKE KINK LOOK INNOCENT
TERMS THAT WOULD MAKE KINK LOOK INNOCENTTERMS THAT WOULD MAKE KINK LOOK INNOCENT
TERMS THAT WOULD MAKE KINK LOOK INNOCENTKakajan Haytlyyev
 
Cómo hablar de sexualidad con los adolescentes
Cómo hablar de sexualidad con los adolescentes Cómo hablar de sexualidad con los adolescentes
Cómo hablar de sexualidad con los adolescentes Alejandro Pooley
 
Aberraciones sexuales
Aberraciones sexualesAberraciones sexuales
Aberraciones sexualesdaniguzman
 
Amatorski as a 'music career' example?
Amatorski as a 'music career' example?Amatorski as a 'music career' example?
Amatorski as a 'music career' example?hilkeros
 
從u-boot 移植 NDS32 談 嵌入式系統開放原始碼開發的 一些經驗
從u-boot 移植 NDS32 談 嵌入式系統開放原始碼開發的 一些經驗從u-boot 移植 NDS32 談 嵌入式系統開放原始碼開發的 一些經驗
從u-boot 移植 NDS32 談 嵌入式系統開放原始碼開發的 一些經驗Macpaul Lin
 
Sobre la pornografía y el cine - Manuel Bláuab
Sobre la pornografía y el cine - Manuel BláuabSobre la pornografía y el cine - Manuel Bláuab
Sobre la pornografía y el cine - Manuel BláuabManuel Sierra Alonso
 
부천오피, 목동오피,안양오피@(다솜넷)수원오피
부천오피, 목동오피,안양오피@(다솜넷)수원오피부천오피, 목동오피,안양오피@(다솜넷)수원오피
부천오피, 목동오피,안양오피@(다솜넷)수원오피dasom013
 
Bdsm intro PART II/2/B
Bdsm intro PART II/2/BBdsm intro PART II/2/B
Bdsm intro PART II/2/BCree Stetler
 
Magazines download. magazines online. pdf magazines
Magazines download. magazines online. pdf magazines Magazines download. magazines online. pdf magazines
Magazines download. magazines online. pdf magazines Downmagaz
 

Viewers also liked (19)

ssh
sshssh
ssh
 
Download Indexed Cache
Download Indexed CacheDownload Indexed Cache
Download Indexed Cache
 
TERMS THAT WOULD MAKE KINK LOOK INNOCENT
TERMS THAT WOULD MAKE KINK LOOK INNOCENTTERMS THAT WOULD MAKE KINK LOOK INNOCENT
TERMS THAT WOULD MAKE KINK LOOK INNOCENT
 
skipfish
skipfishskipfish
skipfish
 
Cómo hablar de sexualidad con los adolescentes
Cómo hablar de sexualidad con los adolescentes Cómo hablar de sexualidad con los adolescentes
Cómo hablar de sexualidad con los adolescentes
 
Aberraciones sexuales
Aberraciones sexualesAberraciones sexuales
Aberraciones sexuales
 
Sin City
Sin CitySin City
Sin City
 
BDSM
BDSMBDSM
BDSM
 
tit
tittit
tit
 
Amatorski as a 'music career' example?
Amatorski as a 'music career' example?Amatorski as a 'music career' example?
Amatorski as a 'music career' example?
 
從u-boot 移植 NDS32 談 嵌入式系統開放原始碼開發的 一些經驗
從u-boot 移植 NDS32 談 嵌入式系統開放原始碼開發的 一些經驗從u-boot 移植 NDS32 談 嵌入式系統開放原始碼開發的 一些經驗
從u-boot 移植 NDS32 談 嵌入式系統開放原始碼開發的 一些經驗
 
Sobre la pornografía y el cine - Manuel Bláuab
Sobre la pornografía y el cine - Manuel BláuabSobre la pornografía y el cine - Manuel Bláuab
Sobre la pornografía y el cine - Manuel Bláuab
 
La Pornografía se Parece Al Fin Del Mundo - Art. Chris Hedges - Truthdig Feb...
La Pornografía se Parece Al Fin Del Mundo - Art. Chris Hedges - Truthdig  Feb...La Pornografía se Parece Al Fin Del Mundo - Art. Chris Hedges - Truthdig  Feb...
La Pornografía se Parece Al Fin Del Mundo - Art. Chris Hedges - Truthdig Feb...
 
부천오피, 목동오피,안양오피@(다솜넷)수원오피
부천오피, 목동오피,안양오피@(다솜넷)수원오피부천오피, 목동오피,안양오피@(다솜넷)수원오피
부천오피, 목동오피,안양오피@(다솜넷)수원오피
 
Bdsm intro PART II/2/B
Bdsm intro PART II/2/BBdsm intro PART II/2/B
Bdsm intro PART II/2/B
 
Bdsm intro
Bdsm introBdsm intro
Bdsm intro
 
SpeakerText Pres
SpeakerText PresSpeakerText Pres
SpeakerText Pres
 
Cuadernos BDSM 1
Cuadernos BDSM 1Cuadernos BDSM 1
Cuadernos BDSM 1
 
Magazines download. magazines online. pdf magazines
Magazines download. magazines online. pdf magazines Magazines download. magazines online. pdf magazines
Magazines download. magazines online. pdf magazines
 

Similar to Metadata - What is Unseen

Blue Teaming On A Budget
Blue Teaming On A BudgetBlue Teaming On A Budget
Blue Teaming On A BudgetKevinRiley83
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Blueinfy Solutions
 
Automation In Android & iOS Application Review
Automation In Android & iOS 	Application Review�Automation In Android & iOS 	Application Review�
Automation In Android & iOS Application ReviewBlueinfy Solutions
 
DataSploit - BlackHat Asia 2017
DataSploit - BlackHat Asia 2017 DataSploit - BlackHat Asia 2017
DataSploit - BlackHat Asia 2017 Shubham Mittal
 
Digital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slidesDigital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slidesmoanasherrill
 
Digital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slidesDigital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slidesCindy Douglas
 
Digital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slidesDigital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slidesEllen Pittleman
 
Cyberscout Corporate Security
Cyberscout   Corporate SecurityCyberscout   Corporate Security
Cyberscout Corporate SecurityFiroze Hussain
 
Thick Application Penetration Testing - A Crash Course
Thick Application Penetration Testing - A Crash CourseThick Application Penetration Testing - A Crash Course
Thick Application Penetration Testing - A Crash CourseNetSPI
 
OSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaOSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaNSConclave
 
2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion DetectionAPNIC
 
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsAndris Soroka
 
Identity and User Access Management.pptx
Identity and User Access Management.pptxIdentity and User Access Management.pptx
Identity and User Access Management.pptxirfanullahkhan64
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentAlexey Pyshkin
 
CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewAlert Logic
 

Similar to Metadata - What is Unseen (20)

Blue Teaming On A Budget
Blue Teaming On A BudgetBlue Teaming On A Budget
Blue Teaming On A Budget
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013
 
Automation In Android & iOS Application Review
Automation In Android & iOS 	Application Review�Automation In Android & iOS 	Application Review�
Automation In Android & iOS Application Review
 
DataSploit - BlackHat Asia 2017
DataSploit - BlackHat Asia 2017 DataSploit - BlackHat Asia 2017
DataSploit - BlackHat Asia 2017
 
Digital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slidesDigital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slides
 
Digital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slidesDigital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slides
 
Digital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slidesDigital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slides
 
Privacy in private browsing mode
Privacy in private browsing modePrivacy in private browsing mode
Privacy in private browsing mode
 
Cyberscout Corporate Security
Cyberscout   Corporate SecurityCyberscout   Corporate Security
Cyberscout Corporate Security
 
Thick Application Penetration Testing - A Crash Course
Thick Application Penetration Testing - A Crash CourseThick Application Penetration Testing - A Crash Course
Thick Application Penetration Testing - A Crash Course
 
OSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaOSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan Braganza
 
2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection
 
Goans-Helms-IT Security at Georgia Tech Library
Goans-Helms-IT Security at Georgia Tech LibraryGoans-Helms-IT Security at Georgia Tech Library
Goans-Helms-IT Security at Georgia Tech Library
 
Web Application Security Testing
Web Application Security TestingWeb Application Security Testing
Web Application Security Testing
 
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
 
Identity and User Access Management.pptx
Identity and User Access Management.pptxIdentity and User Access Management.pptx
Identity and User Access Management.pptx
 
Autopsy Digital forensics tool
Autopsy Digital forensics toolAutopsy Digital forensics tool
Autopsy Digital forensics tool
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product Development
 
Hem second presentation
Hem second presentationHem second presentation
Hem second presentation
 
CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model Overview
 

Recently uploaded

Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 

Recently uploaded (20)

Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 

Metadata - What is Unseen

  • 1. Security Research Institute Edith Cowan University Metadata : What is Unseen Professor Craig Valli Security Research Institute SIG 29th April, 2013
  • 2. Security Research Institute Edith Cowan University What is it in this context • Data in various forms that are embedded in a digital artefact or stream, typically unseen by the user. Including but not limited to – Your email address – Watermarks, logos etc – Server Drive mappings – Notes and edits (since thought to be deleted) – Your geolocation at time of save or capture – Cookies, web application specific data
  • 3. Security Research Institute Edith Cowan University Why not remove? • What do you think feeds search engines? • It can be very useful for internal systems to search on attributes of documents • Can be used to prove provenance of a document • Can be used to provide an avenue for targetted deception
  • 4. Security Research Institute Edith Cowan University Why remove? • It makes good sense from a security perspective, minimal information leakage is optimal • Because in some countries you are leaving yourself open to litigation and or breaches of law (US HIPPA, Privacy Acts, Data Protection) distributing documents with this data in them
  • 5. Security Research Institute Edith Cowan University TCP/IP Stacks, Operating Systems • NMAP, p0f are network mappers that work by looking at the flags in your TCP/IP transmissions. They can reliably fingerprint – Your device – Your operating system – Your patch level of operating system
  • 6. Security Research Institute Edith Cowan University Browsers • The addition of various plug-ins to a browser, in combination with IP numbers used, platform identifiers in the browser and the ubiquitous cookie can make browsers easy to uniquely identify – Mozilla/5.0 (Linux; U; Android 2.2; en-gb; GT-P1000 Build/FROYO) AppleWebKit/533.1 (KHTML, like Gecko) Version/4.0 Mobile Safari/533.1 – Mozilla/5.0 (Linux; U; Android 2.2; en-ca; SGH-T959D Build/FROYO) AppleWebKit/533.1 (KHTML, like Gecko) Version/4.0 Mobile Safari/533.1 – Mozilla/5.0 (Linux; U; Android 2.2; en-gb; GT-P1000 Build/FROYO) AppleWebKit/533.1 (KHTML, like Gecko) Version/4.0 Mobile Safari/533.1 – Mozilla/5.0 (Linux; U; Android 2.0.1; en-us; Droid Build/ESD56) AppleWebKit/530.17 (KHTML, like Gecko) Version/4.0 Mobile Safari/530.17
  • 7. Security Research Institute Edith Cowan University Word Document Metadata • Comments, revision marks from tracked changes, versions, and ink annotations • Headers, footers, and watermarks • Document server properties • Email addresses • Usernames (ADS etc) • Hidden text (formatted as)
  • 8. Security Research Institute Edith Cowan University PDF • Same same as before with Word plus... – Encryption and user access settings – Signature tags – location, signing authority, type of signing etc – Lets not forget executables – Can keep a full history of metadata in the file i.e just changing does not erase...
  • 9. Security Research Institute Edith Cowan University Geotagging • The location data is typically stored within the EXIF records for the image using the EXIF Global Positioning System sub-IFD that uses the TIFF Private Tag 0x882 • Or the application generates the data using a combination of sources to locate e.g GPS and Wireless access points
  • 10. Security Research Institute Edith Cowan University EXIF • The Exchangeable Image File format (EXIF) is a published industry specification for the image file format used by digital cameras • There are over 200 plus identifiers/tags, geo- location, device, serial number etc
  • 11. Security Research Institute Edith Cowan University EXIF
  • 12. Security Research Institute Edith Cowan University Social Media... • Most of these services are “free” in exchange for your data and metadata touch points. Just as in real world no free lunch in cyberspace. • Many of these services give full feeds of their data streams to developers (anyone) • Some of them rely on you to have turned on GPS/geolocation to access the service i.e no geo no service or you are just “checking in”
  • 13. Security Research Institute Edith Cowan University Twitter – 140 characters not! •Links to previous tweets •Authors username •Authors screename •Authors biography •Authors location •Timezone •PlaceID, Printable Name, URL, Type, Bounding Box, Country of place tweet was made •Application that sent the tweet
  • 14. Security Research Institute Edith Cowan University Google...
  • 15. Security Research Institute Edith Cowan University Third Party Service Providers • Various service providers are now developing services that fingerprint your devices and you! • All perfectly legal , drawn from metadata and other sources.
  • 16. Security Research Institute Edith Cowan University Some analysis tools • Metapicz – Google App - is one example of an online based tools that allow extraction data • Geosetter – http://www.geosetter.de/en/ Windows tool to edit/view Geo and other attributes • FOCA – harvester and analyser for metadata from websites • GeoIntelligence – home grown...
  • 17. Security Research Institute Edith Cowan University Solutions • Make sure you turn off geo-location on your devices...unless you want to be tracked • Strip out metadata using a cleanser before sending documents in email or storing on websites, unless you’re setting honeyfiles.. • Use your browsers in anonymous modes on all your devices or set different browser-id strings • Be careful what extensions in use on browsers • Use some of the VM based anonymisers
  • 18. Security Research Institute Edith Cowan University Software and Resources • Office 2010+ - Document Inspector • OpenOffice – http://oometaextractor.codeplex.com/ • Removing Sensitive Data for PDF http://tv.adobe.com/watch/learn-acrobat-x/removing- sensitive-information/
  • 19. Security Research Institute Edith Cowan University References and Resources • Official 2.3 EXIF http://www.cipa.jp/english/hyoujunka/kikaku/pdf/DC-008- 2012_E.pdf • EXIF Tag list http://www.sno.phy.queensu.ca/~phil/exiftool/TagNames/EXIF.ht ml • Hidden Data and Metadata in Adobe PDF Files http://www.nsa.gov/ia/_files/app/pdf_risks.pdf • Official PDF specification - http://www.adobe.com/devnet/pdf/pdf_reference.html