By ro0ted | May 22, 2015 - 17:58 | Posted in /b/ | 3 Comments
#ro0ted #OpNewblood You have pictures of your face on the internet right?

What does exif stand for?

(EX-changeable Image Format)

What can exif data leave behind? Well the most important thing YOUR LOCATION:
66

So before you think it’s smart to show part of your face even if it’s covered. Please remove the exif data for your safety.
Here:
http://verexif.com/

You can find many other sites and photo forensic programs that show a way bigger range in details. This is nothing new. This is just a friendly safety reminder. – ro0ted https://twitter.com/ro0ted/
ro0ted

Please check out my series on, “What the blackhats don’t want you to know” below..#CgAn


 

 

Last tutorial in the series: Meet Volatility Frameworks automatic cousin: Volix

 

(In order)

Why am I teaching Reverse Engineering to inexperienced new Anons in OpNewblood?

Whitehat Lab

ASM Programming

Introduction Part 1 Ollydbg 

Introduction Part 2 Using Ollydbg and Tracing Botnets

Analyzing Botnets

 Introduction Part 3 Ollydbg: Cheating a Crackme

Introduction Part 4 Ollydbg: Your first Patch

Encryption 101

Cuckoo Sandbox: Automated Malware Analysis also known as Malwr.com

Introduction to Honeydrive: A Brief Walk Through

Installing Kippo the SSH Honeypot on a VPS Part 1: How to set it up

Resource Hacker

Dll Injection the Easy Way

Visual Basic Binaries Walk Through Part 1

Ollydbg on Steroids

Creating Patchers Part 1

Have you supported the gas mask campaign over the years?

Crack to win a gas mask gift pack

How to edit a register me crack me Pre Part 1

Unwinding Delphi Binaries Walk Through if not Preview

Cracking Delphi Part 2

Reversing Timed Trials: Ollydbg Tricks Part 3

Analyzing Adware

Preview Against Debugging

Bypassing Registering 101

Bypassing Part 2

Android/iOS Reversing

Introducing IDA Pro: Static Analyzing

Hacker’s Disassembler

Ripping Apart Adware

Never trust Warez or Cracked Programs: Reversing a Crypted IRC bot infected file

IDA PRO Book

Unpacking & Crypting there is a difference

Covert Debugging whitepaper from blackhat.com

Manually Unpacking with Ollydbg

Manually Unpacking Part 2

Manually Unpacking 101

ASM Injecting

ASM Injecting Part 2

ASM Injecting Part 3: Crypt your malicious file

Reversing Trials

Adding Your Menu

ASM Injecting Part 4

ASM Injecting Part 5

Finding Nag Screens & Removing them

REMnux: Linux Toolkit for Reverse-Engineering and Analyzing Malware

REMnux: Volatility Framework ~ Memory Forensics
Volatility Analyzing the ZeuS Bot Part 2
Infected Machine? Create a memory dump
What the gov doesn’t want you to know: All your pastebin data is being LOGGED
Connect to IRC more securely with SSL, add a fingerprint to your nick

(Visited 709 times, 1 visits today)


Trackbacks:

  • You can follow any responses to this entry through the RSS 2.0 feed.
  • Both comments and pings are currently closed.

3 Responses to #ro0ted #OpNewblood You have pictures of your face on the internet right?

  1. Pingback: CyberGuerrilla soApboX » #ro0ted #OpNewblood What the blackhats dont want you to know BE: think ur drive is really wiped?

    […] pastebin data is being LOGGED Connect to IRC more securely with SSL, add a fingerprint to your nick Do…

  2. Pingback: CyberGuerrilla soApboX » #ro0ted #OpNewblood What the blackhats dont want u to know: Memory Cloning + BE in Linux

    […] pastebin data is being LOGGED Connect to IRC more securely with SSL, add a fingerprint to your nick Do…

  3. Pingback: Tutoriales sobre ingeniería inversa | Cyberhades

    […] Do you have pictures of yourself on the internet? You might of leaked your location of where the pic……