Cyber Security Lab
IT Security & IT Forensics Examples

Web Forensics

Cache Manipulation

Load images using various techniques to avoid being cached.


Various images are loaded and displayed on the pages.

What other hidden images can be found?

How does the transfer from the server to the client look like?

Exercise A: Basic Example

Solution of the exercise

The first picture is displayed as normal.

The second picture is larger than shown. The second part with the image of a dog is cut off with the help of CSS.

The third picture is an animated GIF file that shows the photo of a dog after about 30 seconds.