TECH TRAINING 2 – HACKING PDF
TRAINER: Didier Stevens (Security Consultant, Contraste BV)
CAPACITY: 20 pax
SEATS LEFT: REGISTRATION CLOSED
DURATION: 2 days (8th & 9th April 2013)
COST (per pax): EUR1499 (early bird) / EUR1899 (non early-bird)
PDF exploits and malicious PDF documents have been on the radar for several years now. But do you know how to detect them? And how they are constructed?
This training will teach you how to analyze PDF files and create your own PDF hacks. PDF files that execute code, but also PDF documents to embed, obfuscate and hide all types of content.
Didier Stevens will teach you how to use his Python tools to analyze PDF documents and to create your own PDF documents from scratch. With a bit of knowledge of the Python programming language, Didier Stevens will teach you how to use his PDF Python module to create all sorts of “interesting” PDF files. And for good measure, we also throw in a bit of shellcode programming. Didier Stevens will reveal you shellcode he specially designed for PDF files. This shellcode has never been released publicly.
This is not a training on exploit development, but we will see with several exercises how exploits need to be packaged in PDF files. We focus on the PDF language, not on reversing PDF readers
WHO SHOULD ATTEND
KEY LEARNING OBJECTIVES
Deep understanding of the Portable Document Format
Analysis of (malicious) PDF files
Creation of PDF files from scratch for pentesting purposes and other fun
Extensive introduction to the PDF language
Identification of PDF files with pdfid
Analysis of PDF files with pdf-parser (20 exercises)
Creation of PDF files (10 exercises total)
Generation of PDF files to embed payloads
Development of shellcode specially designed to be used in PDF documents
Packaging of a classic PDF exploit with heapspray
Development of a /Launch action exploit