![]() ![]() ![]() The goal is for us to pull down all images for a particular URL on the Wayback Machine, extract any EXIF data and then output all of the information into a spreadsheet that we can then go and review. This little beauty is the gold standard when it comes to extracting EXIF information from photos and is trusted the world over. The second tool is ExifTool, by Phil Harvey. While you can use waybackpack on the commandline as a standalone tool, in this blog post we are going to simply import it and leverage pieces of it to interact with the Wayback Machine. The first is a Python module written by Jeremy Singer-Vine called waybackpack. We are going to leverage a couple of great tools to make this magic happen. Of course I was not going to do this manually, so I thought it was a perfect opportunity to build out a new tool to do it for me. One of the major sources of information for the investigation was The Wayback Machine, which is a popular resource for lots of investigations.įor this particular investigation there were a lot weird images strewn around as clues, and I wondered if it would be possible to retrieve those photos from the Wayback Machine and then examine them for EXIF data to see if we could find authorship details or other tasty nuggets of information. Friends of the Hunchly mailing list and myself embarked on a brief journey to see if we could root out any additional clues or, of course, solve the mystery. Not long ago I was intrigued by the Internet mystery (if you haven’t heard of it check out this podcast). This article was originally posted at the blog.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |