
Clip Main Clip Content Essence List Video Timecode Type: NonDrop. Clip Main Clip Content Essence List Video Frame Rate: 24p. Clip Main Clip Content Essence List Video Bit Depth: 10. Clip Main Clip Content Essence List Video Active Pixel: 4096. Clip Main Clip Content Essence List Video Active Line: 2160. Clip Main Clip Content Essence List Video Codec: H264_422_Intra. Clip Main Clip Content Essence List Video Codec Bit Rate: 400. Clip Main Xmlns : urn:schemas-Professional-Plug-in:Semi-Pro:ClipMetadata:v1.0. Handler Description : Panasonic Static Metadata. Handler Type : Panasonic Static Metadata. Interoperability Index : R98 - DCF basic file (sRGB). Post Focus Merging : Post Focus Auto Merging or None. Data Dump : (Binary data 8 bytes, use -b option to extract). Components Configuration : Y, Cb, Cr,. Sensitivity Type : Standard Output Sensitivity. Exif Byte Order : Little-endian (Intel, II). So what does the EXIF data contain? Pretty much everything you can get the used focal length, the bitrate of the clip, the aperture of the lens when the footage was recorded and a lot more. All your EXIF information will be printed directly in the command line window. Check out the official website to download the application Īfter the download is completed, it's as easy as just writing exiftool /path/to/video_file.mov (you have to enter the correct file path, of course). Using this image file, we can try to hack a website.The freeware application exiftool is available for both Linux, Windows and macOS, and lets you extract all the EXIF information with a single commandline entry. We have successfully hidden the malicious code in an image file. To do this, run this command: exiftool -documentname='' flower.jpg We can also set payload in the “Document Name” meta field. Now check metadata using exiftool flower.jpg command:
Open terminal from your image file location and run this command: exiftool -comment='' flower.jpg flower.jpgīefore injecting malicious code, let’s take a look at the metadata of the image file.
Let’s take an image file to inject a payload. If you need help regarding installation, please comment below. Let’s see: Table of ContentsĪt first, we need to install ExifTool. Hello hackers, in this article I’m going to show how to hide a payload in an image file using ExifTool.