Slide 1
Slide 1
Slide 1
Slide 1
Slide 1
Slide 1


PRESENTATION MATERIALS

           

Photos and videos from all talks will be uploaded in the next couple of weeks. Please follow @HITBSecConf on Twitter or join our Facebook Group

TECH TRAINING 2 – HACKING PDF

TRAINER: Didier Stevens (Security Consultant, Contraste BV)

CAPACITY: 20 pax

SEATS LEFT: REGISTRATION CLOSED

DURATION: 2 days (8th & 9th April 2013)

COST (per pax): EUR1499 (early bird) / EUR1899 (non early-bird)

 

 

OVERVIEW

PDF exploits and malicious PDF documents have been on the radar for several years now. But do you know how to detect them? And how they are constructed?

This training will teach you how to analyze PDF files and create your own PDF hacks. PDF files that execute code, but also PDF documents to embed, obfuscate and hide all types of content.

Didier Stevens will teach you how to use his Python tools to analyze PDF documents and to create your own PDF documents from scratch. With a bit of knowledge of the Python programming language, Didier Stevens will teach you how to use his PDF Python module to create all sorts of “interesting” PDF files. And for good measure, we also throw in a bit of shellcode programming. Didier Stevens will reveal you shellcode he specially designed for PDF files. This shellcode has never been released publicly.

This is not a training on exploit development, but we will see with several exercises how exploits need to be packaged in PDF files. We focus on the PDF language, not on reversing PDF readers

WHO SHOULD ATTEND

• Pentesters
• Hackers

KEY LEARNING OBJECTIVES 

  • Deep understanding of the Portable Document Format

  • Analysis of (malicious) PDF files

  • Creation of PDF files from scratch for pentesting purposes and other fun

AGENDA

DAY 1

Extensive introduction to the PDF language

Identification of PDF files with pdfid

Analysis of PDF files with pdf-parser (20 exercises)

DAY 2

Creation of PDF files (10 exercises total)

Generation of PDF files to embed payloads

Development of shellcode specially designed to be used in PDF documents

Packaging of a classic PDF exploit with heapspray

Development of a /Launch action exploit

 

ABOUT THE TRAINER

Didier Stevens (Security Consultant, Contraste BV)

TBA

EVENT ORGANIZER

LOCAL PARTNER

PLATINUM SPONSOR

GOLD SPONSORS

>

TITANIUM SPONSOR (POST CONFERENCE RECEPTION + SPEAKER RECEPTION)

SILVER SPONSORS


CTF SPONSOR

ALCO_PWN SPONSOR (POST CONFERENCE PARTY)

CTF PRIZE SPONSOR

NETWORK SPONSORS AND UPLINK

ADDITIONAL SUPPORT BY

SUPPORTING MEDIA

FRIENDS OF HITB

Copyright © 2012 Hack In The Box | http://www.hackinthebox.org