ExifTool

ExifTool

One-liner: A command-line tool for reading, writing, and manipulating metadata (especially EXIF) in files like images and PDFs.

🎯 What Is It?

ExifTool is a widely used metadata utility (by Phil Harvey) that can extract embedded metadata from many file formats. In OSINT and DFIR, it’s commonly used to pull out identifiers and context that creators didn’t intend to share (e.g., camera info, timestamps, GPS coordinates, author/copyright fields).

πŸ€” Why It Matters

πŸ”¬ How It Works

Core Principles

  1. Many file types support embedded metadata blocks (EXIF/IPTC/XMP).
  2. Tools can parse these blocks without β€œopening” the file in the normal application.
  3. Metadata is often copied forward when files are re-shared, resized, or reposted (not always).

Technical Deep-Dive

Common usage patterns:

# Dump all metadata
exiftool image.jpg

# Show only GPS-related fields
exiftool -gps:all image.jpg

# Show the field groups (EXIF/IPTC/XMP)
exiftool -G image.jpg

# Output as JSON (useful for scripting)
exiftool -j image.jpg

πŸ›‘οΈ Detection & Prevention

How to Detect

How to Prevent / Mitigate

πŸ“Š Types/Categories

Type Description Example
EXIF Camera/photo metadata GPS, camera make/model
XMP Extensible metadata (Adobe/common) Editing history, creator tool
IPTC Publishing/news metadata Copyright, captioning

🎀 Interview Angles

Common Questions

STAR Story

Situation: A suspected data leak involved screenshots shared publicly.
Task: Determine if shared files exposed internal identifiers.
Action: Extracted metadata, identified authoring tool/user fields, and recommended metadata stripping controls.
Result: Reduced future leakage and improved sharing guidance.

βœ… Best Practices

❌ Common Misconceptions

πŸ“š References