Pular para o conteúdo principal

Whatsapp 47 988618255

Compartilhe

ferramentas para extrair metadados de PDFs e imagens.

Hoje eu vou mostrar as três melhores ferramentas para extrair metadados de PDFs e imagens. Primeiro, o pdfinfo — ótimo para verificar autores, datas de criação e o software utilizado. Depois, o ExifTool — o extrator de metadados mais poderoso, revelando GPS, informações do dispositivo e metadados avançados. E por fim, o Metadata2Go — um analisador online rápido para quando você precisa de resultados imediatos. Use essas ferramentas no seu workflow de OSINT para verificar documentos, rastrear a origem de fotos e descobrir detalhes ocultos.”🎥 Extração de Metadados de PDF e Imagens — Tutorial Completo Neste vídeo, eu compartilho diferentes técnicas e ferramentas que você pode usar para extrair metadados de imagens ou arquivos PDF. Vamos analisar três ferramentas essenciais: Pdfinfo, ExifTool e Metadata2Go. 🔹 1. PDFINFO — Extraindo Metadados de PDFs (Ferramenta Local) O que faz: O pdfinfo lê os metadados estruturais e de autoria armazenados dentro de arquivos PDF. ✅ Como usar (Linux...

Ghost In The Net



Ghost In The Net


Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan


Properties:
  • Network Invisibility
  • Network Anonymity
  • Protects from MITM/DOS
  • Transparent
  • Cross-platform
  • Minimalistic


Dependencies:
  • Linux 2.4.26+ – will work on any Linux-based OS, including Whonix and RaspberryPI
    • BASH – the whole script
    • root privileges – for kernel control

Limitations:
  • You can still be found with VLAN logs if using ethernet or by triangulation/broadcast if using WiFi
  • MAC spoofing won’t work if appropriate mitigations has been taken, like DAI or sticky MAC
  • Might be buggy with some CISCO switches
  • Not suitable for production servers

How it works

     The basic and primary network protocol is ARP for IPv4 and NDP (ICMPv6) for IPv6, located in the link and network layer, provides main connectivity in a LAN. Despite its utility and simplicity, it has numerous vulnerabilities that can lead to a MITM attack and leak of confidentiality. Patching of such a widely used standard is a practically impossible task. A very simple, but at the same time effective solution is to disable ARP and NDP responses on an interface and be very cautious with broadcasting. Considering the varieties of implementations, this means that anyone in the network wouldn’t be able to communication with such host – only if the host is willing itself.

The ARP/NDP cache will be erased quickly afterwards.
Here is an example schema:
A >>> I need MAC address of B >>> B
A <<< Here it is <<< B
A <<< I need MAC address of A <<< B
A >>> I’m not giving it >>> B
To increase privacy, it’s advised to spoof the MAC address, which will provide a better concealment.
All this is possible using simple commands in Linux kernel and a script that automates it all.

Analysis

    No ARP/NDP means no connectivity – an absolute stealth and obscurity on the network/link layer. This protects from all possible DOSes and MITMs (ARP, DNS, DHCP, ICMP, Port Stealing) and is far less resource consuming than other tools, like ArpON [ie]. It doesn’t impact a normal internet or LAN connection from hosts’ perspective. If you’re connecting to a host, it will be authorised to do so, but shortly after stopping the communication, the host will forget about you because, ARP/NDP tables won’t stay long without a fresh request. Regarding the large compatibility and cross-platforming, it’s very useful for offsec/pentest/redteaming as well. You see everyone, but nobody sees you, you’re a ghost. Mitigation and having real supervision on the network will require deep reconfiguration of OSes, IDPSes and all other equipement, so hardly feasible.

How To

You can execute the script after the connection to the network or just before:
sudo GhostInTheNet.sh on eth0
This will activate the solution until reboot.
If you want to stop it:
sudo GhostInTheNet.sh off eth0
Of course, you will have to make the script executable in the first place:
chmod u+x GhostInTheNet.sh

Ghost In The Net Download

Comentários

Como usar um Agente OSINT IA

Pericia Digital

Ebook

OSINT NEWS NO X

Postagens mais visitadas