Can you find out the locations of my photos? Put it in the comments below. // MENU // 0:00 ▶ Introduction - why this is important 1:19 ▶ Why you want to use this Python Script 1:52 ▶ Online Example 2:35 ▶ Python exe file version for Windows 2:59 ▶ Demo of extracting exif data 6:08 ▶ Script versus other applications 7:09 ▶ Python exif csv script 7:45 ▶ Remove exif data Python script 9:07 ▶ Python is not installed on the Windows computer 9:39 ▶ Python demo on Kali Linux - installing required software 12:20 ▶ Create Python script on Kali Linux 13:40 ▶ exif script demo on Kali Linux 14:36 ▶ Remove exif script demo on Kali Linux // PHOTOS // Check my photos here: www.flickr.com/photos/194419969@N07/ // SCRIPTS // Python Exif script: davidbombal.wiki/pythonexif Python Exif CSV script: davidbombal.wiki/pythonexifcsv Python Remove Exif script: davidbombal.wiki/pythonexifremove // SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal UA-cam: ua-cam.com/users/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration. No actual attack took place on any websites. Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Here are my answers to the challenge: 51700115470_5472846399_o.jpg: This picture was captured shortly after take-off at Norman Y. Mineta, San Jose International Airport 51700115620_d0135735eb_o.jpg : This was at Volcan El Cuervo road, La Asomada, Las Palmas, Spain 51700115525_cf4d7a41fd_o.jpg: You took this at National Trust - Wray Castle, Low Wray, England. There is also St. Margaret's Church, Low Wray close by 51699508293_a1c8c65f1f_o.jpg: This was taken just outside Islote de Hilario, Las Palmas, Spain. There's also Restaurant El Diablo in the building. (I guess this was taken from the same trip you as Volcan El Cuervo road, La Asomada. Considering they are both under the same province, Las Palmas) 51698435617_00abe9e41b_o.jpg: You took the picture in the Castlerigg Stone Circle, Cumbria, North West England. There is Keswick Climbing Wall nearby as well. 51712571073_9f48dc36a5_o.jpg: You took the picture at Groenkloof, Pretoria, South Africa. You can find Replica Tanganyika Monument close by, amongst other landmarks around there.
This is extremely important for people to be aware of! I know so many people who don't understand the concept of meta data. Thank you for doing this video, David! I hope this hits everyones recommended today!
I used to post images on FB and IG, not sure why I stopped, however this segment "bares it all". Will pass this info on to my daughter, she uses social media.
So glad to find your channel. You are providing real world examples involving technology. I keep telling people, there is no privacy anymore. I will be sharing this video as an example. Kudo sir.
I just started my coding journey. About 2 weeks. Having problems in dealing with bugs. Indent an all those stuff. If I remember on Snapchat, your location use to show. These are extremely beneficial since we are living in a time where social media rules. Need to protect yourself from external harm.
Sir you know one thing . I really love you and want to become like you . Now I am just a driver but I want to become like you . Thankyou for your support . I wish that I can upgrade my self through your free videos and get a job . Thankyou ❤️
Awesome Video David. Thanks for this information. I am learning a lot from you especially in the CCNA department (currently doing your course on Udemy). I accepted your challenge in this video!! So here goes:- 1) Holding Atomic Habits off the east coast of Morocco (Timanfaya National Park) 2) Fort Schanskop in South Africa 3) You by the National Trust-Wray Castle in the United Kingdom 4) Your Best year Ever by the Volcan El Cuervo
Learning so much, thanks for sharing the knowledge🙏🙏🙏 Location info: 1. Groenkloof, Pretoria 2. Keswick, United Kingdom 3. Las Palmas, Spain 4. Ambleside, United Kingdom 5. Santa Clara Country, USA 6. Las Palmas, Spain
Great video and extremely useful David. Thank you! You always post such amazing content. In a world where privacy seems to be [a distant] thing of the past, this really struck a cord. Thanks too for sharing the code to run - as a newbie, I just need to watch again to follow how to 😂.
Thank you David sir for making extremely useful videos for maintaining our privacy. Loved the videos. Hope you will make cool and helpful videos like this in future.
Most photos uploaded online nowadays have their exif data stripped away by the time it is available to us. I have done some testing on a considerably large pool of pictures that I found online and the only the ones that I had to specify to contain exif data actually exposed any kind of information. You can also easily mitigate exif data transmission by taking a screenshot of the picture and then uploading it.
Your channel & others has been very reliable & Informative when applying it in our own career. Big Ups and many thanks for providing this type of content increase our skill & knowledge. 💯
👍👍👍👍👍Great! Thank you, David. 1. Rmb to first do an "off-line" back-up of all your fond memories b4 you "de-exif" your photos. Just my 2cents back ;) HTH.
ok this is insane , this is amazing , thats why i subscribed , limited knowledge distributed for free thank your Mr David , best channel ever keep up the good work !!!
Please make a video about how to setup cellphone, what apps we should install to prevent in case of someone STEAL cellphone, and what to do after if that happens. Blessings
Thanks for your excellent video. I'm aware of this info but have been wondering how to extract it until today. I'm looking forward to your next video you mentioned.
Theoretically you can put your phone on airplane mode or run a VPN/GPS changer an screenshot your photos then Bluetooth them over to another burner phone and do the same thing just to scrub them before you upload them threw a couple Vbox’s threw a proxy chains In between for some over kill.
I love you so much Mr David you are a wizard when I come to cyber security so you are too much I want to be like you I'm very interested on your video but I do not know how to start your explanation always move me
Hello, was wondering if the TLS decryption (that u done wid Chris) could be done using a MITM, for instance the MITM proxy...Would be great to see that happening, perhaps in your next video with Chris!!!!
Amazing content as always David. I was just wondering how can we extract location via images from Instagram or Facebook? There must be a way to do that.
Thank you David, again very educated (not only technical, but also daily dangers on internet) video :) why don't you install python to your main windows machine? Is it against some malicous programs which runs on python?
Fun side note. Using Java, I built a piece of code that sorted my photos in folder by time frame. ie, yyyymm as the folder, and yyyymm#(n) as the name.
Hi there ! I am began fan of your content, please if you could do a video or serie about python and how to use it for ethical hacking ( i mean practical guide) it would be awesome 😎
Hello! Great tutorial, really informative. For some reason my code doesn't return the google maps url. I'm new to python, so here is my doubt: any chance that some update made the code obsolete? Or is some bug in my machine/code?
Great vid btw. Running on Windows 10. I created with pyinstaller and also auto-py-to-exe, both result in the error message below. I tried to create EXE file from the PY GitHub scripts, but I get the following error . Traceback (most recent call last): File "exif.py", line 18, in from PIL import Image ModuleNotFoundError: No module named 'PIL' [20220] Failed to execute script 'exif' due to unhandled exception!
Mr. David I have one question, On this text file that include location, can I remove or undo any edited on the photo like blur or writing that done on the photo?
Hello David, I want to ask for your advise. I am passionate about networking I have a master in networking also got a CCNP but I am having a hard time breaking into the networking industry. I live in an African country and in my region there wasn't a single networking job offer in the last 5 years. With your life experience if you were in my shoes, a mid twenties individual eager to smash some CLI how would you proceed ?
Can you find out the locations of my photos? Put it in the comments below.
// MENU //
0:00 ▶ Introduction - why this is important
1:19 ▶ Why you want to use this Python Script
1:52 ▶ Online Example
2:35 ▶ Python exe file version for Windows
2:59 ▶ Demo of extracting exif data
6:08 ▶ Script versus other applications
7:09 ▶ Python exif csv script
7:45 ▶ Remove exif data Python script
9:07 ▶ Python is not installed on the Windows computer
9:39 ▶ Python demo on Kali Linux - installing required software
12:20 ▶ Create Python script on Kali Linux
13:40 ▶ exif script demo on Kali Linux
14:36 ▶ Remove exif script demo on Kali Linux
// PHOTOS //
Check my photos here: www.flickr.com/photos/194419969@N07/
// SCRIPTS //
Python Exif script: davidbombal.wiki/pythonexif
Python Exif CSV script: davidbombal.wiki/pythonexifcsv
Python Remove Exif script: davidbombal.wiki/pythonexifremove
// SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: twitter.com/davidbombal
Instagram: instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
UA-cam: ua-cam.com/users/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration. No actual attack took place on any websites.
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Hi David, I want to ask you how can I extract EXIF metadata from video.
Here are my answers to the challenge:
51700115470_5472846399_o.jpg: This picture was captured shortly after take-off at Norman Y. Mineta, San Jose International Airport
51700115620_d0135735eb_o.jpg : This was at Volcan El Cuervo road, La Asomada, Las Palmas, Spain
51700115525_cf4d7a41fd_o.jpg: You took this at National Trust - Wray Castle, Low Wray, England. There is also St. Margaret's Church, Low Wray close by
51699508293_a1c8c65f1f_o.jpg: This was taken just outside Islote de Hilario, Las Palmas, Spain. There's also Restaurant El Diablo in the building. (I guess this was taken from the same trip you as Volcan El Cuervo road, La Asomada. Considering they are both under the same province, Las Palmas)
51698435617_00abe9e41b_o.jpg: You took the picture in the Castlerigg Stone Circle, Cumbria, North West England. There is Keswick Climbing Wall nearby as well.
51712571073_9f48dc36a5_o.jpg: You took the picture at Groenkloof, Pretoria, South Africa. You can find Replica Tanganyika Monument close by, amongst other landmarks around there.
The Atomic Habits photo was most likely taken at the start of the Tour de France.
This is extremely important for people to be aware of! I know so many people who don't understand the concept of meta data. Thank you for doing this video, David! I hope this hits everyones recommended today!
Thank you! And you're welcome!
It hit mine 😊
Exactly, just as I get my parents understanding social engineering now I have to explain Metadata......And then do it for them. Good times ~S
Don't worry it was one of my project 2 year ago,and I found a lot of them have done the same thing long before me
I used to post images on FB and IG, not sure why I stopped, however this segment "bares it all". Will pass this info on to my daughter, she uses social media.
Your videos are filmed so well, they present interesting content in an engaging way. Thank You!
This is mindblowing David! I knew metadata was important, but this is a game changer!
So glad to find your channel. You are providing real world examples involving technology. I keep telling people, there is no privacy anymore. I will be sharing this video as an example. Kudo sir.
I just started my coding journey. About 2 weeks. Having problems in dealing with bugs. Indent an all those stuff. If I remember on Snapchat, your location use to show. These are extremely beneficial since we are living in a time where social media rules. Need to protect yourself from external harm.
I didn't even know that our photos contain our location, thank you for teaching us how to remove it.
It depends on the camera app. I use the OpenCamera app and Geolocation is off by default. Location is not stored unless you explicitly chose to do so.
Turn location off on your phone and i believe you can turn in off in camera settings on al phones
Wow, David! Big Brother knows no bounds in "tracking your wareabouts"...useful techniques.
Sir you know one thing .
I really love you and want to become like you .
Now I am just a driver but I want to become like you .
Thankyou for your support .
I wish that I can upgrade my self through your free videos and get a job .
Thankyou ❤️
I remember learning about this in my computer forensics class in college. Very interesting stuff.
Thank you David for a great tutorial. Love your style of teaching and hope to see more of it!
Awesome, thank you!
Awesome Video David. Thanks for this information. I am learning a lot from you especially in the CCNA department (currently doing your course on Udemy). I accepted your challenge in this video!! So here goes:-
1) Holding Atomic Habits off the east coast of Morocco (Timanfaya National Park)
2) Fort Schanskop in South Africa
3) You by the National Trust-Wray Castle in the United Kingdom
4) Your Best year Ever by the Volcan El Cuervo
In short
You are Legend
Thank you for sharing your knowledge
Learning so much, thanks for sharing the knowledge🙏🙏🙏
Location info:
1. Groenkloof, Pretoria
2. Keswick, United Kingdom
3. Las Palmas, Spain
4. Ambleside, United Kingdom
5. Santa Clara Country, USA
6. Las Palmas, Spain
Great video and extremely useful David. Thank you! You always post such amazing content. In a world where privacy seems to be [a distant] thing of the past, this really struck a cord. Thanks too for sharing the code to run - as a newbie, I just need to watch again to follow how to 😂.
Thank you David sir for making extremely useful videos for maintaining our privacy. Loved the videos. Hope you will make cool and helpful videos like this in future.
I got my location. Great knowledge and scary also. Thanks, from South Africa.
That is really important for us. Thanks for this💕💕💕
This is the most important video. Continue uploading videos of this categories. ❤❤🙌🙌
This is so important.
you are a great man and whatever you show in your video are always true
love you man
Thank you! I really appreciate that!
Imagine how much David really knows and what he’s allowed to share with us lol.
Great video and good information as always. Not sure why anyone would ever trust the Facebook group.
Keep it up!
This was so insightful! Thank you so much for this awesome content!
David is the mister Rogers of IT security
Most photos uploaded online nowadays have their exif data stripped away by the time it is available to us. I have done some testing on a considerably large pool of pictures that I found online and the only the ones that I had to specify to contain exif data actually exposed any kind of information. You can also easily mitigate exif data transmission by taking a screenshot of the picture and then uploading it.
Great video, David!
Congratulations.
even if don't know what you uploaded here i must like it . thinks sir
So nice of you! Hopefully you'll learn something and find the video interesting 😄
This tool was used for finding missing persons at trace labs very helpful tool
hi am new to pentesting and i complete your challenge thank uuuuu a milll
Your channel & others has been very reliable & Informative when applying it in our own career. Big Ups and many thanks for providing this type of content increase our skill & knowledge. 💯
Thank you! And you're welcome! 😄
GOOD evening sir
1st like
1st comment
Feeling Lucky.😊
Thank you Aashish!
Sir when I see your videos I feel motivated and get hungry to learn more 😄😄 You are awesome sir 👍👍👏😊
I tried this to my images but I didin't find any google maps link, does that mean I'm safe?
Yo my man got some moves.......very realistic demonstration, man
Thank you very much! 😄
@@davidbombal I knew that u would reply sir ;)
Lots of love from India !
Man all this technology is overwhelming 😮😮😮
David I found the area of the picture with you and the castle its in (UK) that place looks awesome I wish to go there someday :)
Cool stuff mate, really interesting!
I've always wondered how this was done. Thanks for sharing!
Islote de Hilario
National Trust-Wray Castle
Cam. al Volcan El Cuervo
This content is extremely relevant and helpful! Thank you David for your diligence and instruction.
👍👍👍👍👍Great!
Thank you, David.
1. Rmb to first do an "off-line" back-up of all your fond memories b4 you "de-exif" your photos.
Just my 2cents back ;)
HTH.
Sir thanks so much can't wait to see you to create a video on how to convert python script to exe file
Coming soon
@@davidbombal ok thanks
You should add computer forensic parts into your contents bombal 🤓🤓 it will be so interesting❤🎉
Great idea!!
This is exactly the type of content we need David. PLEASE UPLOAD MORE ETHICAL HACKING VIDEOS PLEASEEE🙏🙏🙏
nice to see the world catching up
Thank you so much, great job David 😎
File format not supported when "less exif_data.txt"
ok this is insane , this is amazing , thats why i subscribed , limited knowledge distributed for free thank your Mr David , best channel ever keep up the good work !!!
Please make a video about how to setup cellphone, what apps we should install to prevent in case of someone STEAL cellphone, and what to do after if that happens.
Blessings
great video, thanks. quick question, why arent the exe files not available?
Thanks for your excellent video. I'm aware of this info but have been wondering how to extract it until today. I'm looking forward to your next video you mentioned.
Thank you!
Very useful information. Thank you for this video.
Thank you Vyas!
I am actually first this time david gonna enjoy the video.
Thank you Sunil!
Just about to give a break from Python to start again my ccna this poped up. You are truly an inspiration sir
You're welcome!
Is interesting this topic. I will go into more detail on the topic! Thank's
amazing video sir 🙌🙌🙌 | it was really informative
Thank you Anoop!
@@davidbombal ☺️
Thanks! Really cool. Now teach us ASCII art!
Hi, nice video as always. Is the same if you use xattr on a mac?
Theoretically you can put your phone on airplane mode or run a VPN/GPS changer an screenshot your photos then Bluetooth them over to another burner phone and do the same thing just to scrub them before you upload them threw a couple Vbox’s threw a proxy chains In between for some over kill.
amazing as always.
works only with the provided flickr photos :( Tried on my own saved photos from google photos but don't show any location links
sad :(
SUCH A GOOD VIDEO !! i love learning new tools and tricks like this, great video david!
Thank you! Glad you enjoyed it!
thanks man
I love you so much Mr David you are a wizard when I come to cyber security so you are too much I want to be like you I'm very interested on your video but I do not know how to start your explanation always move me
Thanks. I miss your motivational videos.
Also successfully working in termux 😊😊
13:34 Vice article with the metadata that lead to McAffe location, savage
David sir you are a legendddd
Legend is back 🔥🔥
Thanks for the knowledge sharing. How can I get the link to the python script?
awaiting for windows video!
This is GOLD!
Thank you Alin!
can i use this script in window
Hello, was wondering if the TLS decryption (that u done wid Chris) could be done using a MITM, for instance the MITM proxy...Would be great to see that happening, perhaps in your next video with Chris!!!!
Thank you for amazing tutorial, may I ask if I turn off the location and take photos, my location information will be stored into photo or not?
Amazing content as always David. I was just wondering how can we extract location via images from Instagram or Facebook? There must be a way to do that.
As far as i know fb does strip most of efix from photos
@@emanueleciccolunghi8419 unless they state and show otherwise, can't trust it!
Great stuff you have here. Thanks !!! I would like to know how I can identify people in photos and their location.
Amazing, thanks for sharing, new Sub.
where i can get exe file of exif
plz more and more about kali linux and python your th best
Thank you! Lots more content coming 😀
I live for your content.
1:12 where do i get that poster i need it for my room
Amazing content here !
Thank you. Glad you think so!
Whats your opinion about Pi-hole... useful, safe?
Great one David, thankyou so much❤
Thank you David, again very educated (not only technical, but also daily dangers on internet) video :) why don't you install python to your main windows machine? Is it against some malicous programs which runs on python?
Thank you David👏🏽👏🏽🙏🏽
You're welcome!
Fun side note. Using Java, I built a piece of code that sorted my photos in folder by time frame. ie, yyyymm as the folder, and yyyymm#(n) as the name.
Hi there ! I am began fan of your content, please if you could do a video or serie about python and how to use it for ethical hacking ( i mean practical guide) it would be awesome 😎
3:14 how do u make that logo?
Hello!
Great tutorial, really informative.
For some reason my code doesn't return the google maps url. I'm new to python, so here is my doubt: any chance that some update made the code obsolete? Or is some bug in my machine/code?
Great vid btw.
Running on Windows 10. I created with pyinstaller and also auto-py-to-exe, both result in the error message below.
I tried to create EXE file from the PY GitHub scripts, but I get the following error .
Traceback (most recent call last):
File "exif.py", line 18, in
from PIL import Image
ModuleNotFoundError: No module named 'PIL'
[20220] Failed to execute script 'exif' due to unhandled exception!
Yu are the best sensei 😍
Mr. David
I have one question,
On this text file that include location, can I remove or undo any edited on the photo like blur or writing that done on the photo?
This video is so satisfying
Got to be early for the videos!
Thank you Luke!
Hello David, I want to ask for your advise. I am passionate about networking I have a master in networking also got a CCNP but I am having a hard time breaking into the networking industry. I live in an African country and in my region there wasn't a single networking job offer in the last 5 years. With your life experience if you were in my shoes, a mid twenties individual eager to smash some CLI how would you proceed ?
Try your best to move where learning about it will be more relevant and where the jobs are at is what I would say. However either way good luck to you
sorry, why when i scan my phots I found only informations about Software and someone else, but nothing about device, google maps...? Thankyou so much
David, how explain only your photos have this information but the other pictures I am testing contain no exif data?
Hello sir i want to ask your help to install metasploitable on virtual machine