|01 Apr 2010||#1|
| || |
Booby-trapping PDF files: A new how-to.
A security researcher has demonstrated a mechanism that exploits PDF files without taking advantage of any particular vulnerabilities.
Didier Stevens' proof of concept exploit relies on running an executable embedded in a PDF file - something that ought to be blocked - by launching a command that ultimately runs an executable.
In the case of Adobe Reader, such attempted launches generate a pop-up dialog box asking users if they want to proceed. However, this is not necessarily a major hurdle because Stevens was also able to manipulate the text displayed by the pop-up in a way that might easily fool most users.
Booby-trapping PDF files: A new how-to ? The Register
|My System Specs|
|Similar help and support threads for2: Booby-trapping PDF files: A new how-to.|
|.wma files appears as .dat files in Temporary Internet Files folder||Browsers & Mail|
|APT Attackers Are Increasingly Using Booby-trapped RTF Documents||Security News|
|Watch Out for Booby Trapped QR Codes, AVG Says||Security News|
|.reg files open Notepad - do not change registry to read older files||Microsoft Office|
|XP Mode: Software Preview Works On Local Files But Not Files On Win7||Virtualization|
|Hackers Booby Trap uTorrent Downloads with Malware||Security News|
|booby-trapped e-mail Worm Spreads Rapidly Across the World||News|
|Our Sites ||Site Links ||About Us ||Find Us |
© Designer Media Ltd
All times are GMT -5. The time now is 05:02 AM.