Home
Tools
Malybuzz
peepdf
Pub
Advisories
Exploits
Articles
Presentations
Var
Scripts
About
Home
Workshop
Analysis of a CVE-2013-3346/CVE-2013-5065 exploit with peepdf
Conferences
Exploits
PDF
peepdf
Shellcode
Tools
Vulnerabilities
Workshop
There are already some good blog posts talking about this exploit, but I think this is a really good example to show how
peepdf
works and what you can learn next month if you attend the
1day-workshop
“Squeezing Exploit Kits and PDF Exploits”
at
Troopers14
or the
2h-workshop
"PDF Attack: A Journey from the Exploit Kit to the Shellcode"
at
Black Hat Asia (Singapore)
. The mentioned exploit was using the
Adobe Reader ToolButton Use-After-Free vulnerability
to execute code in the victim's machine and then the
Windows privilege escalation 0day
to bypass the
Adobe sandbox
and execute a new payload without restrictions.
This is what we see when we open the PDF document (
6776bda19a3a8ed4c2870c34279dbaa9
) with
peepdf
:
Submitted by jesparza on Thu, 2014/02/20 - 21:48
Read more
Español
Search this site:
Scripts
Security
Spam
Reversing
Shellcode
Social Networking
Research
Botnet
Botnets
Exploits
Python
peepdf
Vulnerabilities
Citadel
Fraud
Tools
Exploit kits
Black Hat
NFC
Tatanga
Mobile
Javascript
PDF
Specifications
Analysis
Conferences
Feodo
Malware
Challenge
ZeuS
more tags
Latest blog posts
Dridex spam campaign using PDF as infection vector
Adding a scoring system in peepdf
Travelling to the far side of Andromeda at Botconf 2015
Black Hat Arsenal peepdf challenge solution
Black Hat Arsenal peepdf challenge
peepdf news: GitHub, Google Summer of Code and Black Hat
Andromeda/Gamarue bot loves JSON too (new versions details)
Quick analysis of the CVE-2013-2729 obfuscated exploits
Dissecting SmokeLoader (or Yulia's sweet ass proposition)
Released peepdf v0.3
more
Security Posts
Infocon: green
Nation-state hackers exploit Cisco firewall 0-days to backdoor government networks
Deepfakes in the courtroom: US judicial panel debates new AI evidence rules
'ArcaneDoor' Cyberspies Hacked Cisco Firewalls to Access Government Networks
ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices
5 Best VPN Services (2024): For Routers, PC, iPhone, Android, and More
Understanding how Rationality, Deterrence Theory, and Indeterminism Influence Cybercrime.
ShotSpotter Keeps Listening for Gunfire After Contracts Expire
ISC Stormcast For Wednesday, April 24th, 2024 https://isc.sans.edu/podcastdetail/8952, (Wed, Apr 24th)
API Rug Pull - The NIST NVD Database and API (Part 4 of 3), (Wed, Apr 24th)
Phishing Attacks Rise 58% in the Year of AI: ThreatLabz 2024 Phishing Report
5 reasons to strive for better disclosure processes
3 healthcare organizations that are building cyber resilience
5 ways to strengthen healthcare cybersecurity
Android Malware Vultur Expands Its Wingspan
Cybersecurity Concerns for Ancillary Strength Control Subsystems
Update on Naked Security
more