EPISODE 3
In Episode two of the series, we utilize PowerShell CmdLets to identify potential files of interest, in this example a set of jpeg files. PowerShell then launches a Python script and passes the path of each identified target photo. Python then processes and extracts EXIF data from each image and provides a table of results back to the PowerShell script.

Related Episodes
Techno Security
Join Chet Hosmer as he discusses the art of detecting fake photos at TechnoSecurity 2019 in Texas on Tuesday, October 1
PowerShell & Python Ep. 2
In Episode two of the series, we utilize PowerShell CmdLets to identify potential files of interest, in this example a set of jpeg files. PowerShell then launches a Python script and passes the path of each identified target photo. Python then processes and extracts EXIF data from each image and provides a table of results back to the PowerShell script.
0 Comments