SlideShare a Scribd company logo
Security Research Institute
Edith Cowan University
Metadata : What is Unseen
Professor Craig Valli
Security Research Institute
SIG 29th April, 2013
Security Research Institute
Edith Cowan University
What is it in this context
• Data in various forms that are embedded in a
digital artefact or stream, typically unseen by the
user. Including but not limited to
– Your email address
– Watermarks, logos etc
– Server Drive mappings
– Notes and edits (since thought to be deleted)
– Your geolocation at time of save or capture
– Cookies, web application specific data
Security Research Institute
Edith Cowan University
Why not remove?
• What do you think feeds search engines?
• It can be very useful for internal systems to
search on attributes of documents
• Can be used to prove provenance of a document
• Can be used to provide an avenue for targetted
deception
Security Research Institute
Edith Cowan University
Why remove?
• It makes good sense from a security
perspective, minimal information leakage is
optimal
• Because in some countries you are leaving
yourself open to litigation and or breaches of
law (US HIPPA, Privacy Acts, Data Protection)
distributing documents with this data in them
Security Research Institute
Edith Cowan University
TCP/IP Stacks, Operating Systems
• NMAP, p0f are network mappers that work by
looking at the flags in your TCP/IP transmissions.
They can reliably fingerprint
– Your device
– Your operating system
– Your patch level of operating system
Security Research Institute
Edith Cowan University
Browsers
• The addition of various plug-ins to a browser, in
combination with IP numbers used, platform
identifiers in the browser and the ubiquitous
cookie can make browsers easy to uniquely
identify
– Mozilla/5.0 (Linux; U; Android 2.2; en-gb; GT-P1000 Build/FROYO) AppleWebKit/533.1
(KHTML, like Gecko) Version/4.0 Mobile Safari/533.1
– Mozilla/5.0 (Linux; U; Android 2.2; en-ca; SGH-T959D Build/FROYO) AppleWebKit/533.1
(KHTML, like Gecko) Version/4.0 Mobile Safari/533.1
– Mozilla/5.0 (Linux; U; Android 2.2; en-gb; GT-P1000 Build/FROYO) AppleWebKit/533.1
(KHTML, like Gecko) Version/4.0 Mobile Safari/533.1
– Mozilla/5.0 (Linux; U; Android 2.0.1; en-us; Droid Build/ESD56) AppleWebKit/530.17
(KHTML, like Gecko) Version/4.0 Mobile Safari/530.17
Security Research Institute
Edith Cowan University
Word Document Metadata
• Comments, revision marks from tracked
changes, versions, and ink annotations
• Headers, footers, and watermarks
• Document server properties
• Email addresses
• Usernames (ADS etc)
• Hidden text (formatted as)
Security Research Institute
Edith Cowan University
PDF
• Same same as before with Word plus...
– Encryption and user access settings
– Signature tags – location, signing authority, type of
signing etc
– Lets not forget executables
– Can keep a full history of metadata in the file i.e just
changing does not erase...
Security Research Institute
Edith Cowan University
Geotagging
• The location data is typically
stored within the EXIF records for
the image using the EXIF Global
Positioning System sub-IFD that
uses the TIFF Private Tag 0x882
• Or the application generates the
data using a combination of
sources to locate e.g GPS and
Wireless access points
Security Research Institute
Edith Cowan University
EXIF
• The Exchangeable Image File format (EXIF) is a
published industry specification for the image file
format used by digital cameras
• There are over 200 plus identifiers/tags, geo-
location, device, serial number etc
Security Research Institute
Edith Cowan University
EXIF
Security Research Institute
Edith Cowan University
Social Media...
• Most of these services are “free” in exchange for
your data and metadata touch points. Just as in
real world no free lunch in cyberspace.
• Many of these services give full feeds of their
data streams to developers (anyone)
• Some of them rely on you to have turned on
GPS/geolocation to access the service i.e no geo
no service or you are just “checking in”
Security Research Institute
Edith Cowan University
Twitter – 140 characters not!
•Links to previous tweets
•Authors username
•Authors screename
•Authors biography
•Authors location
•Timezone
•PlaceID, Printable Name, URL,
Type, Bounding Box, Country of
place tweet was made
•Application that sent the tweet
Security Research Institute
Edith Cowan University
Google...
Security Research Institute
Edith Cowan University
Third Party Service Providers
• Various service
providers are now
developing services
that fingerprint your
devices and you!
• All perfectly legal
, drawn from
metadata and other
sources.
Security Research Institute
Edith Cowan University
Some analysis tools
• Metapicz – Google App - is one example of an
online based tools that allow extraction data
• Geosetter – http://www.geosetter.de/en/
Windows tool to edit/view Geo and other
attributes
• FOCA – harvester and analyser for metadata
from websites
• GeoIntelligence – home grown...
Security Research Institute
Edith Cowan University
Solutions
• Make sure you turn off geo-location on your
devices...unless you want to be tracked
• Strip out metadata using a cleanser before
sending documents in email or storing on
websites, unless you’re setting honeyfiles..
• Use your browsers in anonymous modes on all
your devices or set different browser-id strings
• Be careful what extensions in use on browsers
• Use some of the VM based anonymisers
Security Research Institute
Edith Cowan University
Software and Resources
• Office 2010+ - Document Inspector
• OpenOffice – http://oometaextractor.codeplex.com/
• Removing Sensitive Data for PDF
http://tv.adobe.com/watch/learn-acrobat-x/removing-
sensitive-information/
Security Research Institute
Edith Cowan University
References and Resources
• Official 2.3 EXIF
http://www.cipa.jp/english/hyoujunka/kikaku/pdf/DC-008-
2012_E.pdf
• EXIF Tag list
http://www.sno.phy.queensu.ca/~phil/exiftool/TagNames/EXIF.ht
ml
• Hidden Data and Metadata in Adobe PDF Files
http://www.nsa.gov/ia/_files/app/pdf_risks.pdf
• Official PDF specification -
http://www.adobe.com/devnet/pdf/pdf_reference.html

More Related Content

Viewers also liked

ssh
sshssh
Download Indexed Cache
Download Indexed CacheDownload Indexed Cache
Download Indexed Cache
Christian Heinrich
 
TERMS THAT WOULD MAKE KINK LOOK INNOCENT
TERMS THAT WOULD MAKE KINK LOOK INNOCENTTERMS THAT WOULD MAKE KINK LOOK INNOCENT
TERMS THAT WOULD MAKE KINK LOOK INNOCENT
Kakajan Haytlyyev
 
skipfish
skipfishskipfish
Cómo hablar de sexualidad con los adolescentes
Cómo hablar de sexualidad con los adolescentes Cómo hablar de sexualidad con los adolescentes
Cómo hablar de sexualidad con los adolescentes
Alejandro Pooley
 
Aberraciones sexuales
Aberraciones sexualesAberraciones sexuales
Aberraciones sexuales
daniguzman
 
Sin City
Sin CitySin City
Sin City
Nico Musella
 
BDSM
BDSMBDSM
tit
tittit
Amatorski as a 'music career' example?
Amatorski as a 'music career' example?Amatorski as a 'music career' example?
Amatorski as a 'music career' example?
hilkeros
 
從u-boot 移植 NDS32 談 嵌入式系統開放原始碼開發的 一些經驗
從u-boot 移植 NDS32 談 嵌入式系統開放原始碼開發的 一些經驗從u-boot 移植 NDS32 談 嵌入式系統開放原始碼開發的 一些經驗
從u-boot 移植 NDS32 談 嵌入式系統開放原始碼開發的 一些經驗
Macpaul Lin
 
Sobre la pornografía y el cine - Manuel Bláuab
Sobre la pornografía y el cine - Manuel BláuabSobre la pornografía y el cine - Manuel Bláuab
Sobre la pornografía y el cine - Manuel Bláuab
Manuel Sierra Alonso
 
La Pornografía se Parece Al Fin Del Mundo - Art. Chris Hedges - Truthdig Feb...
La Pornografía se Parece Al Fin Del Mundo - Art. Chris Hedges - Truthdig  Feb...La Pornografía se Parece Al Fin Del Mundo - Art. Chris Hedges - Truthdig  Feb...
La Pornografía se Parece Al Fin Del Mundo - Art. Chris Hedges - Truthdig Feb...
Oscar Ayala A. International Consulting Services
 
부천오피, 목동오피,안양오피@(다솜넷)수원오피
부천오피, 목동오피,안양오피@(다솜넷)수원오피부천오피, 목동오피,안양오피@(다솜넷)수원오피
부천오피, 목동오피,안양오피@(다솜넷)수원오피
dasom013
 
Bdsm intro PART II/2/B
Bdsm intro PART II/2/BBdsm intro PART II/2/B
Bdsm intro PART II/2/B
Cree Stetler
 
Bdsm intro
Bdsm introBdsm intro
Bdsm intro
Cree Stetler
 
SpeakerText Pres
SpeakerText PresSpeakerText Pres
SpeakerText Pres
Megan McCusker
 
Cuadernos BDSM 1
Cuadernos BDSM 1Cuadernos BDSM 1
Cuadernos BDSM 1
Luis. A. Quintero. F
 
Magazines download. magazines online. pdf magazines
Magazines download. magazines online. pdf magazines Magazines download. magazines online. pdf magazines
Magazines download. magazines online. pdf magazines
Downmagaz
 

Viewers also liked (19)

ssh
sshssh
ssh
 
Download Indexed Cache
Download Indexed CacheDownload Indexed Cache
Download Indexed Cache
 
TERMS THAT WOULD MAKE KINK LOOK INNOCENT
TERMS THAT WOULD MAKE KINK LOOK INNOCENTTERMS THAT WOULD MAKE KINK LOOK INNOCENT
TERMS THAT WOULD MAKE KINK LOOK INNOCENT
 
skipfish
skipfishskipfish
skipfish
 
Cómo hablar de sexualidad con los adolescentes
Cómo hablar de sexualidad con los adolescentes Cómo hablar de sexualidad con los adolescentes
Cómo hablar de sexualidad con los adolescentes
 
Aberraciones sexuales
Aberraciones sexualesAberraciones sexuales
Aberraciones sexuales
 
Sin City
Sin CitySin City
Sin City
 
BDSM
BDSMBDSM
BDSM
 
tit
tittit
tit
 
Amatorski as a 'music career' example?
Amatorski as a 'music career' example?Amatorski as a 'music career' example?
Amatorski as a 'music career' example?
 
從u-boot 移植 NDS32 談 嵌入式系統開放原始碼開發的 一些經驗
從u-boot 移植 NDS32 談 嵌入式系統開放原始碼開發的 一些經驗從u-boot 移植 NDS32 談 嵌入式系統開放原始碼開發的 一些經驗
從u-boot 移植 NDS32 談 嵌入式系統開放原始碼開發的 一些經驗
 
Sobre la pornografía y el cine - Manuel Bláuab
Sobre la pornografía y el cine - Manuel BláuabSobre la pornografía y el cine - Manuel Bláuab
Sobre la pornografía y el cine - Manuel Bláuab
 
La Pornografía se Parece Al Fin Del Mundo - Art. Chris Hedges - Truthdig Feb...
La Pornografía se Parece Al Fin Del Mundo - Art. Chris Hedges - Truthdig  Feb...La Pornografía se Parece Al Fin Del Mundo - Art. Chris Hedges - Truthdig  Feb...
La Pornografía se Parece Al Fin Del Mundo - Art. Chris Hedges - Truthdig Feb...
 
부천오피, 목동오피,안양오피@(다솜넷)수원오피
부천오피, 목동오피,안양오피@(다솜넷)수원오피부천오피, 목동오피,안양오피@(다솜넷)수원오피
부천오피, 목동오피,안양오피@(다솜넷)수원오피
 
Bdsm intro PART II/2/B
Bdsm intro PART II/2/BBdsm intro PART II/2/B
Bdsm intro PART II/2/B
 
Bdsm intro
Bdsm introBdsm intro
Bdsm intro
 
SpeakerText Pres
SpeakerText PresSpeakerText Pres
SpeakerText Pres
 
Cuadernos BDSM 1
Cuadernos BDSM 1Cuadernos BDSM 1
Cuadernos BDSM 1
 
Magazines download. magazines online. pdf magazines
Magazines download. magazines online. pdf magazines Magazines download. magazines online. pdf magazines
Magazines download. magazines online. pdf magazines
 

Similar to Metadata - What is Unseen

Blue Teaming On A Budget
Blue Teaming On A BudgetBlue Teaming On A Budget
Blue Teaming On A Budget
KevinRiley83
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013
Blueinfy Solutions
 
Automation In Android & iOS Application Review
Automation In Android & iOS 	Application Review�Automation In Android & iOS 	Application Review�
Automation In Android & iOS Application Review
Blueinfy Solutions
 
DataSploit - BlackHat Asia 2017
DataSploit - BlackHat Asia 2017 DataSploit - BlackHat Asia 2017
DataSploit - BlackHat Asia 2017
Shubham Mittal
 
Digital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slidesDigital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slides
moanasherrill
 
Digital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slidesDigital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slides
Ellen Pittleman
 
Digital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slidesDigital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slides
Cindy Douglas
 
Privacy in private browsing mode
Privacy in private browsing modePrivacy in private browsing mode
Privacy in private browsing mode
Aparna “Ash” Himmatramka
 
Cyberscout Corporate Security
Cyberscout   Corporate SecurityCyberscout   Corporate Security
Cyberscout Corporate Security
Firoze Hussain
 
Thick Application Penetration Testing - A Crash Course
Thick Application Penetration Testing - A Crash CourseThick Application Penetration Testing - A Crash Course
Thick Application Penetration Testing - A Crash Course
NetSPI
 
OSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaOSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan Braganza
NSConclave
 
2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection
APNIC
 
Goans-Helms-IT Security at Georgia Tech Library
Goans-Helms-IT Security at Georgia Tech LibraryGoans-Helms-IT Security at Georgia Tech Library
Goans-Helms-IT Security at Georgia Tech Library
National Information Standards Organization (NISO)
 
Web Application Security Testing
Web Application Security TestingWeb Application Security Testing
Web Application Security Testing
Agile Testing Alliance
 
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
Andris Soroka
 
Identity and User Access Management.pptx
Identity and User Access Management.pptxIdentity and User Access Management.pptx
Identity and User Access Management.pptx
irfanullahkhan64
 
Autopsy Digital forensics tool
Autopsy Digital forensics toolAutopsy Digital forensics tool
Autopsy Digital forensics tool
Sreekanth Narendran
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product Development
Alexey Pyshkin
 
Hem second presentation
Hem second presentationHem second presentation
Hem second presentation
Hemprasad Badgujar
 
CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model Overview
Alert Logic
 

Similar to Metadata - What is Unseen (20)

Blue Teaming On A Budget
Blue Teaming On A BudgetBlue Teaming On A Budget
Blue Teaming On A Budget
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013
 
Automation In Android & iOS Application Review
Automation In Android & iOS 	Application Review�Automation In Android & iOS 	Application Review�
Automation In Android & iOS Application Review
 
DataSploit - BlackHat Asia 2017
DataSploit - BlackHat Asia 2017 DataSploit - BlackHat Asia 2017
DataSploit - BlackHat Asia 2017
 
Digital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slidesDigital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slides
 
Digital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slidesDigital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slides
 
Digital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slidesDigital toolbox researchanddevelopment_slides
Digital toolbox researchanddevelopment_slides
 
Privacy in private browsing mode
Privacy in private browsing modePrivacy in private browsing mode
Privacy in private browsing mode
 
Cyberscout Corporate Security
Cyberscout   Corporate SecurityCyberscout   Corporate Security
Cyberscout Corporate Security
 
Thick Application Penetration Testing - A Crash Course
Thick Application Penetration Testing - A Crash CourseThick Application Penetration Testing - A Crash Course
Thick Application Penetration Testing - A Crash Course
 
OSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaOSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan Braganza
 
2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection
 
Goans-Helms-IT Security at Georgia Tech Library
Goans-Helms-IT Security at Georgia Tech LibraryGoans-Helms-IT Security at Georgia Tech Library
Goans-Helms-IT Security at Georgia Tech Library
 
Web Application Security Testing
Web Application Security TestingWeb Application Security Testing
Web Application Security Testing
 
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
 
Identity and User Access Management.pptx
Identity and User Access Management.pptxIdentity and User Access Management.pptx
Identity and User Access Management.pptx
 
Autopsy Digital forensics tool
Autopsy Digital forensics toolAutopsy Digital forensics tool
Autopsy Digital forensics tool
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product Development
 
Hem second presentation
Hem second presentationHem second presentation
Hem second presentation
 
CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model Overview
 

Recently uploaded

The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Diana Rendina
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 

Recently uploaded (20)

The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 

Metadata - What is Unseen

  • 1. Security Research Institute Edith Cowan University Metadata : What is Unseen Professor Craig Valli Security Research Institute SIG 29th April, 2013
  • 2. Security Research Institute Edith Cowan University What is it in this context • Data in various forms that are embedded in a digital artefact or stream, typically unseen by the user. Including but not limited to – Your email address – Watermarks, logos etc – Server Drive mappings – Notes and edits (since thought to be deleted) – Your geolocation at time of save or capture – Cookies, web application specific data
  • 3. Security Research Institute Edith Cowan University Why not remove? • What do you think feeds search engines? • It can be very useful for internal systems to search on attributes of documents • Can be used to prove provenance of a document • Can be used to provide an avenue for targetted deception
  • 4. Security Research Institute Edith Cowan University Why remove? • It makes good sense from a security perspective, minimal information leakage is optimal • Because in some countries you are leaving yourself open to litigation and or breaches of law (US HIPPA, Privacy Acts, Data Protection) distributing documents with this data in them
  • 5. Security Research Institute Edith Cowan University TCP/IP Stacks, Operating Systems • NMAP, p0f are network mappers that work by looking at the flags in your TCP/IP transmissions. They can reliably fingerprint – Your device – Your operating system – Your patch level of operating system
  • 6. Security Research Institute Edith Cowan University Browsers • The addition of various plug-ins to a browser, in combination with IP numbers used, platform identifiers in the browser and the ubiquitous cookie can make browsers easy to uniquely identify – Mozilla/5.0 (Linux; U; Android 2.2; en-gb; GT-P1000 Build/FROYO) AppleWebKit/533.1 (KHTML, like Gecko) Version/4.0 Mobile Safari/533.1 – Mozilla/5.0 (Linux; U; Android 2.2; en-ca; SGH-T959D Build/FROYO) AppleWebKit/533.1 (KHTML, like Gecko) Version/4.0 Mobile Safari/533.1 – Mozilla/5.0 (Linux; U; Android 2.2; en-gb; GT-P1000 Build/FROYO) AppleWebKit/533.1 (KHTML, like Gecko) Version/4.0 Mobile Safari/533.1 – Mozilla/5.0 (Linux; U; Android 2.0.1; en-us; Droid Build/ESD56) AppleWebKit/530.17 (KHTML, like Gecko) Version/4.0 Mobile Safari/530.17
  • 7. Security Research Institute Edith Cowan University Word Document Metadata • Comments, revision marks from tracked changes, versions, and ink annotations • Headers, footers, and watermarks • Document server properties • Email addresses • Usernames (ADS etc) • Hidden text (formatted as)
  • 8. Security Research Institute Edith Cowan University PDF • Same same as before with Word plus... – Encryption and user access settings – Signature tags – location, signing authority, type of signing etc – Lets not forget executables – Can keep a full history of metadata in the file i.e just changing does not erase...
  • 9. Security Research Institute Edith Cowan University Geotagging • The location data is typically stored within the EXIF records for the image using the EXIF Global Positioning System sub-IFD that uses the TIFF Private Tag 0x882 • Or the application generates the data using a combination of sources to locate e.g GPS and Wireless access points
  • 10. Security Research Institute Edith Cowan University EXIF • The Exchangeable Image File format (EXIF) is a published industry specification for the image file format used by digital cameras • There are over 200 plus identifiers/tags, geo- location, device, serial number etc
  • 11. Security Research Institute Edith Cowan University EXIF
  • 12. Security Research Institute Edith Cowan University Social Media... • Most of these services are “free” in exchange for your data and metadata touch points. Just as in real world no free lunch in cyberspace. • Many of these services give full feeds of their data streams to developers (anyone) • Some of them rely on you to have turned on GPS/geolocation to access the service i.e no geo no service or you are just “checking in”
  • 13. Security Research Institute Edith Cowan University Twitter – 140 characters not! •Links to previous tweets •Authors username •Authors screename •Authors biography •Authors location •Timezone •PlaceID, Printable Name, URL, Type, Bounding Box, Country of place tweet was made •Application that sent the tweet
  • 14. Security Research Institute Edith Cowan University Google...
  • 15. Security Research Institute Edith Cowan University Third Party Service Providers • Various service providers are now developing services that fingerprint your devices and you! • All perfectly legal , drawn from metadata and other sources.
  • 16. Security Research Institute Edith Cowan University Some analysis tools • Metapicz – Google App - is one example of an online based tools that allow extraction data • Geosetter – http://www.geosetter.de/en/ Windows tool to edit/view Geo and other attributes • FOCA – harvester and analyser for metadata from websites • GeoIntelligence – home grown...
  • 17. Security Research Institute Edith Cowan University Solutions • Make sure you turn off geo-location on your devices...unless you want to be tracked • Strip out metadata using a cleanser before sending documents in email or storing on websites, unless you’re setting honeyfiles.. • Use your browsers in anonymous modes on all your devices or set different browser-id strings • Be careful what extensions in use on browsers • Use some of the VM based anonymisers
  • 18. Security Research Institute Edith Cowan University Software and Resources • Office 2010+ - Document Inspector • OpenOffice – http://oometaextractor.codeplex.com/ • Removing Sensitive Data for PDF http://tv.adobe.com/watch/learn-acrobat-x/removing- sensitive-information/
  • 19. Security Research Institute Edith Cowan University References and Resources • Official 2.3 EXIF http://www.cipa.jp/english/hyoujunka/kikaku/pdf/DC-008- 2012_E.pdf • EXIF Tag list http://www.sno.phy.queensu.ca/~phil/exiftool/TagNames/EXIF.ht ml • Hidden Data and Metadata in Adobe PDF Files http://www.nsa.gov/ia/_files/app/pdf_risks.pdf • Official PDF specification - http://www.adobe.com/devnet/pdf/pdf_reference.html