Posts

Showing posts from December, 2024

Information Security : Finding Documents Metadata

  Information Security : Finding Documents Metadata A vast quantity of information is embedded in document files by the tools that corporations employ to create their papers. Naturally, the contents of the file comprise a large portion of this information. However, the file also contains a significant amount of metadata, which is information about information or information that describes other information. A large portion of the formatting and presentation of the other data in the file are related to this information. In addition to this formatting information, many applications for creating and modifying files contain other metadata items that penetration testers may find helpful during our reconnaissance stage, for example we can look at below information For password-guessing and exploitation assaults, penetration testers frequently require usernames which may be embedded in the metadata.  Understanding the entire trajectory of the original file at the time of creatio...

Python Asyncio Implementation

  We will be discussing the basics of using asyncio in python. Lets us first discuss this using an example. from time import perf_counter,sleep def function1 (): print ( "Call made to the second function....\n" ) sleep( 2 ) print ( "Second function1 execution completed...\n" ) s=perf_counter() print ( "The main function is starting...\n" ) function1() print ( "Hello World \n" ) print ( "The main function ending ...\n" ) print ( f"The total time taken is : {perf_counter()-s} " ) Now we will see the output of the program for us to see what has happened. The main function is starting... Call made to the second function .... Second function1 execution completed... Hello World The main function ending ... The total time taken is : 2.0017361999925924 Lets see the code execution one by one : The first function which is the main function is called. Then the 2nd function called function1() has been called, it st...