Meta Pi 


Any actions and or activities related to the material contained within this Website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. Cyber Security Associates Limited, will not be held responsible for any criminal charges brought against any individuals misusing the information in these projects to break the law.

Please ensure you are using the latest SD Card image which is available here.


Learning Outcomes

  • Understand metadata;

  • Learn how to extract EXIF data using exiftools;

  • Understand why this information is important to “ethical” hackers.


Hardware Required

Component Number (Box Case)

Slot 1

Slot 11

Slot 11

Slot 2

Slot 11

Slot 11

Slot 12

Slot 13


Raspberry Pi + Case 

USB Cable 

Kali SD Card 

TFT Screen 

HDMI Cable 



Power Supply Unit 


Video Guide



Metadata doesn’t just apply to images, PDF’s or MP3 content, it applies to a wide range of files. It can even be used for online activity to allow individuals and organisations to discover more about how information is used for cyber attacks. There is a lot of data, e.g GPS information, that we don’t realise that can be extracted very easily and used against us. Not all devices attach EXIF data to the images that they create, for example a lot of modern smart phones don’t attach the GPS data to images; however, many still do. This project has focused on gathering information for the first phase of “ethical” hacking, where as much public information is gathered to create a detailed picture of the target organisation or individual for further social engineering and targeting.