Cover photo by Justin Meyers/Null Byte

How to Obtain Valuable Data from Images Using Exif Extractors

Null Byte
8 min readJun 18, 2019

Metadata contained in images and other files can give away a lot more information than the average user might think. By tricking a target into sending a photo containing GPS coordinates and additional information, a hacker can learn where a mark lives or works simply by extracting the Exif data hidden inside the image file.

For hackers or OSINT researchers gathering digital evidence, photos can be a rich source of data. Besides what’s visible in the picture itself, metadata about when and where the photo was taken can also be recoverable. This data can include the device the photo was taken on, the geolocation of the image, and other unique characteristics that can fingerprint an image as haven been taken by the same person or device.

Metadata, or the data that describes files like images or videos, is useful during reconnaissance to investigators because it’s often overlooked by otherwise careful targets. If people don’t know what kind of data can be retained in a particular file format, they won’t know if they’re putting themselves at risk by making a specific file public. While many social media platforms have largely eliminated this problem by stripping out metadata from files, there are still many images online with this data left entirely intact.

--

--

Null Byte

The aspiring white-hat hacker/security awareness playground