If the image is part of an investigation (common in cybersecurity or CTFs), focus on the metadata and hidden artifacts.
Explain why this state is a problem (e.g., "Prevents user from completing payment"). 2. Digital Forensics/Analysis Write-up
Mention the device, OS, and browser version where the screenshot was taken. Observations: Trigger: What action was performed right before this shot? ss (8).jpg
Note the file size, MD5/SHA-256 hash, and naming convention.
Describe the visible information. If it’s a screenshot of a registry or log file, list the key entries like "Last Used" software or "Mounted Devices". 3. Creative/Social Media Post Write-up If the image is part of an investigation
Identify specific UI elements shown in the image that indicate a failure or success.
Creating a "write-up" for a file named ss (8).jpg —typically a generic name for a screenshot—depends entirely on its purpose. Below are three useful templates ranging from technical documentation to personal blogging. 1. Technical/Bug Report Write-up Describe the visible information
Use tools like ExifTool to check for a "Date Taken" timestamp, GPS coordinates, or camera model.