PDF File Format: Basic Structure
1. Introduction We all know that there are a number of attacks where an attacker includes some shellcode into a PDF document, which uses some kind of vulnerability in how the PDF document is analyzed and presented to the user to execute malicious code on the targeted system. The next ...
Hacking PDF: util.prinf() Buffer Overflow: Part 2
For part 1 of this series, click here. 1. Introduction In the previous part we've seen the structure of the PDF document and extracted the JavaScript contained in object 6. We also determined that the extracted JavaScript is run when the PDF document is opened. Now it's time ...
Hacking PDF: util.prinf() Buffer Overflow: Part 1
1. Introduction One of the first things we need to do is to remove the PDF Reader we currently have installed and reinstall the old version of PDF Reader. The old version of PDF Reader can be found on various web pages, but most prominent web page is definitely oldapps ...