mirror of
https://github.com/gchq/CyberChef
synced 2025-01-08 10:38:46 +00:00
fix scan embedded files, bson. Only RemoveExif remains
This commit is contained in:
parent
223e2e0b73
commit
1f771a9e01
1 changed files with 12 additions and 11 deletions
|
@ -198,8 +198,10 @@ Full hash: $2a$10$ODeP1.6fMsb.ENk2ngPUCO7qTGVPyHA9TqDVcyupyed8FjsiF65L6`;
|
||||||
}),
|
}),
|
||||||
|
|
||||||
it("BSON Serialise / Deserialise", () => {
|
it("BSON Serialise / Deserialise", () => {
|
||||||
const result = chef.BSONDeserialise(chef.BSONSerialise({"phrase": "Mouth-watering"}));
|
const result = chef.BSONDeserialise(chef.BSONSerialise("{\"phrase\": \"Mouth-watering\"}"));
|
||||||
assert.strictEqual(result.toString(), "{\"phrase\": \"Mouth-watering\"}");
|
assert.strictEqual(result.toString(), `{
|
||||||
|
"phrase": "Mouth-watering"
|
||||||
|
}`);
|
||||||
}),
|
}),
|
||||||
|
|
||||||
it("Bzip2 Decompress", () => {
|
it("Bzip2 Decompress", () => {
|
||||||
|
@ -783,8 +785,7 @@ jmPGsv1elXxVzqs58UZLD2c3vBhGkU2BV6kRKh+lj/EcVrzsFhGCz/7DKxPoDHLS
|
||||||
}),
|
}),
|
||||||
|
|
||||||
it("Remove EXIF", () => {
|
it("Remove EXIF", () => {
|
||||||
const picBuffer = fs.readFileSync("test/tests/nodeApi/sampleData/pic.jpg");
|
const result = chef.removeEXIF(fs.readFileSync("test/tests/nodeApi/sampleData/pic.jpg"));
|
||||||
const result = chef.removeEXIF(picBuffer);
|
|
||||||
assert.strictEqual(result.toString().length(), 4582);
|
assert.strictEqual(result.toString().length(), 4582);
|
||||||
}),
|
}),
|
||||||
|
|
||||||
|
@ -793,17 +794,17 @@ jmPGsv1elXxVzqs58UZLD2c3vBhGkU2BV6kRKh+lj/EcVrzsFhGCz/7DKxPoDHLS
|
||||||
const expected = `Scanning data for 'magic bytes' which may indicate embedded files. The following results may be false positives and should not be treat as reliable. Any suffiently long file is likely to contain these magic bytes coincidentally.
|
const expected = `Scanning data for 'magic bytes' which may indicate embedded files. The following results may be false positives and should not be treat as reliable. Any suffiently long file is likely to contain these magic bytes coincidentally.
|
||||||
|
|
||||||
Offset 0 (0x00):
|
Offset 0 (0x00):
|
||||||
File extension: jpg
|
File extension: jpg
|
||||||
MIME type: image/jpeg
|
MIME type: image/jpeg
|
||||||
|
|
||||||
Offset 30 (0x1e):
|
Offset 30 (0x1e):
|
||||||
File extension: tif
|
File extension: tif
|
||||||
MIME type: image/tiff
|
MIME type: image/tiff
|
||||||
|
|
||||||
Offset 212 (0xd4):
|
Offset 212 (0xd4):
|
||||||
File extension: txt
|
File extension: txt
|
||||||
MIME type: text/plain
|
MIME type: text/plain
|
||||||
Description: UTF-8 encoded Unicode byte order mark detected, commonly but not exclusively seen in text files.
|
Description: UTF-8 encoded Unicode byte order mark detected, commonly but not exclusively seen in text files.
|
||||||
|
|
||||||
|
|
||||||
16 file types were detected that have common byte sequences. These are likely to be false positives. Run this operation with the 'Ignore common byte sequences' option unchecked to see details.`;
|
16 file types were detected that have common byte sequences. These are likely to be false positives. Run this operation with the 'Ignore common byte sequences' option unchecked to see details.`;
|
||||||
|
|
Loading…
Reference in a new issue