Metadata Bug Exif Data [Bug Bounty]

hackersque
4 min readNov 4, 2020

Metadata Bug Exif Data [Bug Bounty]

What Is Metadata

Metadata is abstracts about data. … A simple archetype of metadata for a certificate ability accommodate a accumulating of advice like the author, book size, the date the certificate was created, and keywords to call the document. Metadata for a music book ability accommodate the artist’s name, the album, and the year it was released

Metadata describes added data. It provides advice about a assertive item’s content. For example, an angel may accommodate metadata that describes how ample the account is, the blush depth, the angel resolution, back the angel was created, and added data. A argument document’s metadata may accommodate advice about how continued the certificate is, who the columnist is, back the certificate was written, and a abbreviate arbitrary of the document.

How To Find This Bug In website

1.visit your target website

2.search for any upload option in your target website

3.if you find any upload options upload an image you can download exif image from here https://github.com/ianare/exif-samples

4.after upload refresh the page and download the image from where you upload

5.after download visit this website http://metapicz.com upload your image here

6.if you see any data of your image as show in picture then there is exif data bug

you can report it to website owner

hello and welcome to my blog

in this blog you will learn more about cyber securityfor exmaple ethical hacking , bug bounty, programming.and iam going to teach you about more tool in kali linux .and i will teach you about bug bountyand how to find bug in a website after this you can earn money by doing bug bounty just follow my steps.in programming iam going to teach python and i will teach you how to create your own hacking tools using python etcso please share this stay tuned more videos are upcoming

how to use nmap
what is nmapNmap, abbreviate for Arrangement Mapper, is a free, open-source apparatus for vulnerability scanning and arrangement discovery. Arrangement administrators use Nmap to analyze what accessories are active on their systems, advertent hosts that are accessible and the casework they offer, award accessible ports and audition aegis risks.

Nmap can be acclimated to adviser distinct hosts as able-bodied as all-inclusive networks that beset hundreds of bags of accessories and multitudes of subnets.

Though Nmap has acquired over the years and is acutely flexible, at affection it’s a port-scan tool, acquisition advice by sending raw packets to arrangement ports. It listens for responses and determines whether ports are open, bankrupt or filtered in some way by, for example, a firewall. Other agreement acclimated for anchorage scanning accommodate anchorage analysis or enumeration.

how to run namp1.open terminal type namp -h hor help
simple nmap scan nmap (target ip)

It …

clickjacking attack

what is clickjackingClickjacking is an advance that tricks a user into beat a webpage aspect which is airy or bearded as addition element. This can account users to accidentally download malware, appointment awful web pages, accommodate accreditation or acute information, alteration money, or acquirement articles online. Typically, clickjacking is performed by announcement an airy folio or HTML element, central an iframe, on top of the folio the user sees. The user believes they are beat the arresting folio but in actuality they are beat an airy aspect in the added folio antipodal on top of it. Clickjacking attack example1.The attacker creates an attractive page which promises to give the user a free trip to Tahiti. 2.In the accomplishments the antagonist checks if the user is logged into his cyberbanking armpit and if so, endless the awning that enables alteration of funds, application concern ambit to admit the attacker’s coffer capacity into the form. 3.The coff…

Originally published at https://hackerque.blogspot.com on November 4, 2020.

--

--