Cyber security Course

Creating and Analyzing a Malicious PDF File with PDF-Parser Tool

This tool will parse a PDF document to distinguish the central components utilized as a part of analyzed file. It won’t render a PDF archive.

Features included:

  • Load/parse objects and headers
  • Extract metadata (author, description, …)
  • Extract text from ordered pages
  • Support of compressed pdf
  • Support of MAC OS Roman charset encoding
  • Handling of hexa and octal encoding in text sections
  • PSR-0 compliant (autoloader)
  • PSR-1 compliant (code styling)

You can Take the best Certified Cyber Threat Intelligence Analyst online course to learn and analyze more related cyber threats.

Analyzing a Malicious PDF File

We have created the PDF file with an EXE file embedded with it.

Step 1: To launch the PDF parser type pdf-parser

root@kali:~# pdf-parser -h

 List all the options with PDFParser

Step2: To get the stats of the PDF Document.

root@kali:~# pdf-parser -a /root/Desktop/template.pdf

Step3: Passing stream data through Filters FlateDecode,ASCIIHexDecode, ASCII85Decode, LZWDecode and RunLengthDecode.

root@kali:~# pdf-parser -f /root/Desktop/template.pdf

Step4: To get the Hashes of the PDF file.

root@kali:~# pdf-parser -H /root/Desktop/template.pdf

Step5: Case sensitive search in streams

root@kali:~# pdf-parser –casesensitive /root/Desktop/template.pdf

Step6: To get the javascripts added with the document.

pdf-parser –search javascript –raw /root/Desktop/template.pdf

The stats option show insights of the items found in the PDF report. Utilize this to recognize PDF archives with unusual/unexpected objects, or to characterize PDF records.

The search option scans for a string in indirect objects (not inside the surge of Indirect objects). The inquiry is not case-sensitive and is defenseless to obfuscation methods.

Filter option applies the filter(s) to the stream, whereas raw option makes pdf-parser output raw data.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Also Read:

Guru Baran

View Comments

Recent Posts

FBI Hacks Back Hive Ransomware Gang’s Infrastructure – Website Seized

As a result of an international law enforcement operation, the sites utilized by the Hive…

22 mins ago

Yandex Denies Hack – Source Code Leaked on Popular Hacking Forum

The source code of Yandex, the largest IT company in Russia and commonly referred to…

14 hours ago

Hackers Abuse Legitimate Remote Monitoring Tools to Steal Banking Data

A joint Cybersecurity Advisory (CSA) from the Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency…

19 hours ago

U.S. Sues Google for Dominance Over Digital Advertising Technologies

Recently, the US Justice Department along with the eight states filed a lawsuit against Google,…

2 days ago

Top FinTech API Security Challenges

A recent report reveals that the number of attacks on financial service APIs and web applications worldwide…

3 days ago

Wireshark 4.0.3 Released – What’s New!

The Wireshark Team has recently unveiled the latest iteration of their widely-utilized packet analyzer, Wireshark…

3 days ago