December 2017
Intermediate to advanced
860 pages
16h 1m
English
PDF file format-based exploits are those that trigger vulnerabilities in various PDF readers and parsers, which when are made to execute the payload carrying PDF files, presenting the attacker with complete access to the target system in the form of a meterpreter shell or a command shell. However, before getting into the technique, let's see what vulnerability we are targeting and what the environment details are:
| Test cases | Description |
| Vulnerability | Stack overflow in uniquename from the Smart Independent Glyplets (SING) table |
| Exploited on operating system | Windows 7 32-bit |
| Software version | Adobe Reader 9 |
| Affected versions |
Adobe Reader 9.3.4 and earlier versions for Windows, Macintosh, and UNIX Adobe Acrobat ... |
Read now
Unlock full access