Tracking IP info with its Metadata

January 19, 2018 | Views: 4873

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

 

What is Metadata

Metadata provide information about other data. It is simply a description of data. Metadata contain some elements described below :

  1. Who created it and when
  2. Who last modified it and when
  3. Tags and its categories
  4. Who can access and update

Let’s Get started 

  •  First clone in to this GitHub url ” https://github.com/ChrisTruncer/Just-Metadata.git

  •  Now go to Metadata/setup directory and install by typing ./setup.sh

 

 

 

 It should start installing dependencies

  • Now we need to create a text file and insert the IP of our victim , to do this just type cat > victim.txt then press return and input your victim’s IP then close it.

  •  Load the program by typing python JustMetadata.py 

 

 

  • Now type Load victim.txt to load our vicitm’s IP into the framework.

  •  Now type list gather and it will show you all available modules for gathering info ,but we are intrested in gathering every information so type gather All to gather all information from available module.

  •  It will start gathering info.

  •  Its time to run analyze module against the data loaded into the framework. These modules can be used to find IP addresses that share the same SSH keys or SSL Public Key certificates, or certificate chains. They can also be used to find IP addresses used in the same callbacks by malicious executable. So type analyze All to do all analyzation.

  • It will ask you for input Like no CIDR block you want, what country you are looking for, so just type your desired ans as shown below.

 

  • Finally when it will gather all data about your victim just type export victim which will save all information in the tool directory for investigate it later.

 Now we can take a look at the dump data for information.

 

So by using this methods you can gathers and analyzes metadata about IP addresses.

 

Share with Friends
FacebookTwitterGoogle+LinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterGoogle+LinkedInEmail
Ready to share your knowledge and expertise?
7 Comments
  1. Please send this information in PDF format.
    If it possible.

  2. Can you please explain the steps? Can’t follow. Thanks

Page 2 of 2«12
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel