Any actions and or activities related to the material contained within this Website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. Cyber Security Associates Limited, will not be held responsible for any criminal charges brought against any individuals misusing the information in these projects to break the law.
Please ensure you are using the latest SD Card image which is available here.
Learn how to extract EXIF data using exiftools;
Understand why this information is important to “ethical” hackers.
Component Number (Box Case)
Raspberry Pi + Case
Kali SD Card
Power Supply Unit
Metadata doesn’t just apply to images, PDF’s or MP3 content, it applies to a wide range of files. It can even be used for online activity to allow individuals and organisations to discover more about how information is used for cyber attacks. There is a lot of data, e.g GPS information, that we don’t realise that can be extracted very easily and used against us. Not all devices attach EXIF data to the images that they create, for example a lot of modern smart phones don’t attach the GPS data to images; however, many still do. This project has focused on gathering information for the first phase of “ethical” hacking, where as much public information is gathered to create a detailed picture of the target organisation or individual for further social engineering and targeting.