Malicious Document Analysis Beginners Guide.

Size: px
Start display at page:

Download "Malicious Document Analysis Beginners Guide."

Transcription

1 Malicious Document Analysis Beginners Guide

2 PDF(Portable Document Format) Malicious Document Analysis 2

3 PDF Overview Adobe Systems created the Portable Document Format PDF became an open standard on July 1, 2008 Adobe borrowed heavily from the PostScript page description language Designed to bundle all objects, fonts, images and other related content into a single portable file format. Allows for creators to create dynamic elements so the users can interact with the document Very rich feature set which supports many different embedded file types (U3d, Tiff..) different compression algorithms, scripting language and many other features PDF specifications are documented but Adobe Reader isn't very strict when adhering to them First Exploit outlook.pdfworm.txt aka Peachy August Malicious Document Analysis 3

4 PDF File Structure Header : PDF Version Body : Containing series of object that are used in the document define a numbered top-level object. The first number is the object number, the second number is the revision number Cross-reference table : Specifies the position of the objects Object #1 is at offset 10 Object #2 is at offset Object #5 is at offset Malicious Document Analysis 4

5 PDF File Structure(cont) Trailer : information about where the document starts Malicious Document Analysis 5

6 PDF Object Type Boolean : true / false Number : e.g. 3 Name (/Name) names are identifier Dictionary(<< >>) : this is a unordered list of (Name, Object) pairs. Array([x y z ]) : an ordered list of object, e.g. [ ] String ((text)) : text Stream(<</Length >>stream. endstream) : embedded data, can be compressed null object Indirect reference(n r R) : reference an object, e.g. 5 0 R Malicious Document Analysis 6

7 Stream Filters The stream was here represented directly(as clear text)? This is uncommon: most streams are compressed ASCII85Decode a deprecated filter used to put the stream into 7-bit ASCII ASCIIHexDecode similar to ASCII85Decode but less compact FlateDecode a commonly used filter based on the zlib/deflate algorithm LZWDecode a deprecated filter based on LZW RunLengthDecode/DCTDecode/CCITTFaxDecode/JBIG2Decode/JPXDec ode Malicious Document Analysis 7

8 PDF Analysis Tools pdf-parser.py by Didder Stevens pdfid.py by Didder Stevens peepdf.py by Jose Miguel Esparza pdftk by pdflabs appp.py by inreverse Malicious Document Analysis 8

9 PDF Analysis Analysis using Hex Editor? Analysis Process Search /Javascript Identify objects Dump/Decode objects Analyze script Malicious Document Analysis 9

10 PDF Analysis using pdf-parser.py (cont) Search : -s /Javascript Identify/Dump : -o ObjectID -f Malicious Document Analysis 10

11 Office Files Malicious Document Analysis 11

12 Office File Structured Storage (OLE SS) defines a file system inside the binary Microsoft Office file. Data can be storage (folder) and stream (file). Excel stores data inside the workbook stream. PowerPoint stores data inside the PowerPoint Document stream. Word stores data inside various streams. First Exploit CVE Office 98 Mac Edition

13 OLESS OLESS Header FAT FS SectorNumbers OLESS directory entries Data is divided into directories folder(storages) and files (streams) Depending on the application streams may contain Macros Graphics Tables Sounds Animations. Parsing can be done using the Win32 COM API (StgOpenStorage(), IStorage methods, IStream methods) Malicious Document Analysis 13

14 Malicious MS Office document structure Malicious Document Analysis 14

15 Analysis Tools OfficeMalScanner locates shellcode and VBA macros from MS Office (DOC, XLS, and PPT) files. MalHost-Setup extracts shellcode from a given offset in an MS Office file and embeds it an EXE file for further analysis. (Part of OfficeMalScanner) Offvis shows raw contents and structure of an MS Office file, and identifies some common exploits. Hachoir-urwid can navigate through the structure of binary Office files and view stream contents. Office Binary Translator converts DOC, PPT, and XLS files into Open XML files (includes BiffView tool). pyolescanner.py can examine and decode some aspects of malicious binary Office files. FileHex (not free) and FileInsight hex editors can parse and edit OLE structures Malicious Document Analysis 15

16 Microsoft Office Low Hanging Indicators ASCII HEX Shellcode (nop slide) Embedded Adobe SWF Malicious Document Analysis 16

17 OffVis Malicious Document Analysis 17

18 OfficeMalScanner OfficeMalScanner is a forensic tool for analysts to find malicious traces in MS Office documents. Scan mode Shellcode/Action Scan, Suspicious Strings(UrlDownloadToFile, GetTempPath, WinExec, ) Info mode The INFO mode dumps OLE structures, offsets, length and saves found VB-Macro code to disk Inflate mode(office 2007~) Decompresses Ms Office 2007 documents, into a temp dir and marks potentially malicious files. Documents with macros included (docm, pptm and xlsm) contain.bin files, usually vbaproject.bin (Old MSOffice format) Such files could host malicious macro code and can extracted using the OfficeMalScanner INFO mode. Switch brute/debug Malicious Document Analysis 18

19 OfficeMalScanner : Scan mode GetEIP Find Kernel32 base Find SEH(Structured Exception Handling) API Hashing Indirect Function Call Suspicious Strings Decrypt Trick Embedded OLE Data Function Prolog PE Signature Malicious Document Analysis 19

20 OfficeMalScanner : Inflate mode Malicious Document Analysis 20

21 Thanks Malicious Document Analysis 21

Digital Forensics Lecture 02B Analyzing PDFs. Akbar S. Namin Texas Tech University Spring 2017

Digital Forensics Lecture 02B Analyzing PDFs. Akbar S. Namin Texas Tech University Spring 2017 Digital Forensics Lecture 02B Analyzing PDFs Akbar S. Namin Texas Tech University Spring 2017 PDF Format and Structure Tools used Text editor (e.g., vi) ClamAV antivirus (http://www.clamav.net/lang/en/download/

More information

Obfuscation and (non-)detection of malicious PDF files. Jose Miguel Esparza

Obfuscation and (non-)detection of malicious PDF files. Jose Miguel Esparza Obfuscation and (non-)detection of malicious PDF files Jose Miguel Esparza Agenda Introduction to the PDF format Obfuscation and evasion techniques Obfuscation vs. Antivirus Obfuscation vs. Analysis tools

More information

PDF. Applying File Structure Inspection to Detecting Malicious PDF Files. Received: November 18, 2013, Accepted: July 11, 2014

PDF. Applying File Structure Inspection to Detecting Malicious PDF Files. Received: November 18, 2013, Accepted: July 11, 2014 PDF 1,a) 2,b) 2 2013 11 18, 2014 7 11 MS Rich Text Compound File Binary PDF PDF PDF PDF 164 99.4% PDF Applying File Structure Inspection to Detecting Malicious PDF Files Yuhei Otsubo 1,a) Mamoru Mimura

More information

Portable Document Malware, the Office, and You

Portable Document Malware, the Office, and You Portable Document Malware, the Office, and You Get owned with it, can't do business without it! Seth Hardy Senior Malware Analyst Threat Research and Response shardy@messagelabs.com SecTor 2009 October

More information

Digital Forensics Lecture 02 PDF Structure

Digital Forensics Lecture 02 PDF Structure Digital Forensics Lecture 02 PDF Structure PDF Files Structure Akbar S. Namin Texas Tech University Spring 2017 PDF Format and Structure Tools used Text editor (e.g., vi) ClamAV antivirus (http://www.clamav.net/lang/en/download/

More information

A Short Introduction to PDF

A Short Introduction to PDF A Short Introduction to PDF Peter Fischer, ZITI, Uni Heidelberg 1 pdf vs. Postscript pdf describes graphics, text & document structure It uses vector graphics, very similar to postscript Some differences

More information

PDF Essentials. The Structure of PDF Documents

PDF Essentials. The Structure of PDF Documents Dr. Edgar Huckert 63773 Goldbach, Germany E-Mail: Huckert@compuserve.com 6-97 PDF Essentials PDF is an acronym for "Portable Document Format". The format has been designed by Adobe for the exchange of

More information

DESIGN OF THE EXCEL VBA PASSWORD CHANGING MODULE

DESIGN OF THE EXCEL VBA PASSWORD CHANGING MODULE DESIGN OF THE EXCEL VBA PASSWORD CHANGING MODULE Jang, Seung-Ju 1 1 Department of Computer Engineering, Dongeui University, Korea Sjjang@deu.ac.kr ABSTRACT In this paper, I design a module that can change

More information

ID: Sample Name: PO xls Cookbook: defaultwindowsofficecookbook.jbs Time: 03:13:36 Date: 08/01/2018 Version:

ID: Sample Name: PO xls Cookbook: defaultwindowsofficecookbook.jbs Time: 03:13:36 Date: 08/01/2018 Version: ID: 41861 Sample Name: PO65445465.xls Cookbook: defaultwindowsofficecookbook.jbs Time: 03::36 Date: 08/01/2018 Version: 20.0.0 Table of Contents Analysis Report Overview Information Detection Confidence

More information

Getting Owned By Malicious PDF - Analysis

Getting Owned By Malicious PDF - Analysis Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Getting

More information

ID: Sample Name: FsQHOWXph8.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 20:31:13 Date: 16/03/2018 Version:

ID: Sample Name: FsQHOWXph8.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 20:31:13 Date: 16/03/2018 Version: ID: 50648 Sample Name: FsQHOWXph8.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 20:31: Date: 16/03/2018 Version: 22.0.0 Table of Contents Analysis Report Overview Information Detection Confidence

More information

ID: Sample Name: SSB SBV Daily Report - Logistics Template DEC '17 (8).xlsm Cookbook: defaultwindowsofficecookbook.jbs Time: 06:35:29 Date:

ID: Sample Name: SSB SBV Daily Report - Logistics Template DEC '17 (8).xlsm Cookbook: defaultwindowsofficecookbook.jbs Time: 06:35:29 Date: ID: 41310 Sample Name: SSB SBV Daily Report - Logistics Template DEC '17 (8).xlsm Cookbook: defaultwindowsofficecookbook.jbs Time: 06:35:29 Date: 31/12/2017 Version: 20.0.0 Table of Contents Analysis Report

More information

DOWNLOAD OR READ : FREE FOR IGCSE MATHEMATICS MARK SCHEME PAPER OCTOBER NOVEMBER 2012 PDF EBOOK EPUB MOBI

DOWNLOAD OR READ : FREE FOR IGCSE MATHEMATICS MARK SCHEME PAPER OCTOBER NOVEMBER 2012 PDF EBOOK EPUB MOBI DOWNLOAD OR READ : FREE FOR IGCSE MATHEMATICS MARK SCHEME PAPER 2 0580 21 OCTOBER NOVEMBER 2012 PDF EBOOK EPUB MOBI Page 1 Page 2 free for igcse mathematics mark scheme paper 2 0580 21 october november

More information

Introducing PDF/UA. The new International Standard for Accessible PDF Technology. Solving PDF Accessibility Problems

Introducing PDF/UA. The new International Standard for Accessible PDF Technology. Solving PDF Accessibility Problems Introducing PDF/UA The new International Standard for Accessible PDF Technology Solving PDF Accessibility Problems Introducing PDF/UA Agenda Why PDF What is PDF What is PDF/UA PDF/UA & WCAG 2.0 CommonLook

More information

ID: Sample Name: Luxus.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 10:22:08 Date: 09/01/2018 Version:

ID: Sample Name: Luxus.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 10:22:08 Date: 09/01/2018 Version: ID: 42035 Sample Name: Luxus.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 10:22:08 Date: 09/01/2018 Version: 20.0.0 Table of Contents Table of Contents Analysis Report Overview Information Detection

More information

ID: Sample Name: test.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 18:57:54 Date: 12/04/2018 Version:

ID: Sample Name: test.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 18:57:54 Date: 12/04/2018 Version: ID: 54427 Sample Name: test.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 18:57:54 Date: /04/2018 Version: 22.0.0 Table of Contents Analysis Report Overview Information Detection Confidence Classification

More information

DOWNLOAD OR READ : WHERE TO GET FREE ENGINE DIAGRAMS 1995 SPORT JET MERCURY PDF EBOOK EPUB MOBI

DOWNLOAD OR READ : WHERE TO GET FREE ENGINE DIAGRAMS 1995 SPORT JET MERCURY PDF EBOOK EPUB MOBI DOWNLOAD OR READ : WHERE TO GET FREE ENGINE DIAGRAMS 1995 SPORT JET MERCURY PDF EBOOK EPUB MOBI Page 1 Page 2 where to get free engine diagrams 1995 sport jet mercury where to get free pdf where to get

More information

ID: Sample Name: MSM- 24_Supply_List RU_518.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 17:15:48 Date: 19/06/2018 Version: 22.0.

ID: Sample Name: MSM- 24_Supply_List RU_518.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 17:15:48 Date: 19/06/2018 Version: 22.0. ID: 64635 Sample Name: MSM- 24_Supply_List RU_518.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 17::48 Date: 1/06/2018 Version: 22.0.0 Table of Contents Analysis Report Overview Information Detection

More information

ID: Sample Name: SSI Set Details.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 01:14:07 Date: 13/04/2018 Version: 22.0.

ID: Sample Name: SSI Set Details.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 01:14:07 Date: 13/04/2018 Version: 22.0. ID: 54478 Sample Name: SSI Set Details.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 01:14:07 Date: /04/2018 Version: 22.0.0 Table of Contents Analysis Report Overview Information Detection Confidence

More information

ExeFilter. An open-source framework for active content filtering. CanSecWest /03/2008

ExeFilter. An open-source framework for active content filtering. CanSecWest /03/2008 ExeFilter An open-source framework for active content filtering CanSecWest 2008 28/03/2008 http://cansecwest.com Philippe Lagadec NATO/NC3A philippe.lagadec(à)nc3a.nato.int ExeFilter Goals To protect sensitive

More information

ID: Sample Name: 21PO jpg...js Cookbook: default.jbs Time: 14:32:06 Date: 21/11/2017 Version:

ID: Sample Name: 21PO jpg...js Cookbook: default.jbs Time: 14:32:06 Date: 21/11/2017 Version: ID: 371 Sample Name: 21PO201745.jpg...js Cookbook: default.jbs Time: 14:32:0 Date: 21/11/2017 Version: 20.0.0 Table of Contents Table of Contents Analysis Report Overview Information Detection Confidence

More information

Differences between using a workbook in Excel 2016 Online and in Excel Online

Differences between using a workbook in Excel 2016 Online and in Excel Online Differences between using a workbook in Excel 2016 Online and in Excel Online File formats that are supported in Excel Online Excel workbook files (.xlsx) Excel 97-2003 workbook files (.xls). Note: When

More information

Detection of Suspicious PDF Document- Embedded Code

Detection of Suspicious PDF Document- Embedded Code Int. J. of Comp. & Info. Tech., (2016) 4(3): 71-78. ISBN: 2345-3877 www.ijocit.org Volume 4, Issue 3 Review Paper Detection of Suspicious PDF Document- Embedded Code Er. Gurjot Singh 1* Received: 13 Jun

More information

ID: Sample Name: TO_HM_CROWN PR#U0130NCE MOHAMMED B#U0130N SALMAN - Dear Prime Minister.doc Cookbook: defaultwindowsofficecookbook.

ID: Sample Name: TO_HM_CROWN PR#U0130NCE MOHAMMED B#U0130N SALMAN - Dear Prime Minister.doc Cookbook: defaultwindowsofficecookbook. ID: 63341 Sample Name: TO_HM_CROWN PR#U0130NCE MOHAMMED B#U0130N SALMAN - Dear Prime Minister.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 08:43:14 Date: 10/06/2018 Version: 22.0.0 Table of Contents

More information

ID: Sample Name: FD-1 Phase Out Notice.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 14:36:29 Date: 04/05/2018 Version: 22.0.

ID: Sample Name: FD-1 Phase Out Notice.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 14:36:29 Date: 04/05/2018 Version: 22.0. ID: 5762 Sample Name: FD-1 Phase Out Notice.doc Cookbook: defaultwindowsofficecookbook.jbs Time: :36:2 Date: 04/05/2018 Version: 22.0.0 Table of Contents Analysis Report Overview Information Detection

More information

Overview Metadata Extraction Tool Hachoir Sleuthkit Summary CS 6V Metadata Extraction Tools. Junyuan Zeng

Overview Metadata Extraction Tool Hachoir Sleuthkit Summary CS 6V Metadata Extraction Tools. Junyuan Zeng CS 6V81-05 Metadata Extraction Tools Junyuan Zeng Department of Computer Science The University of Texas at Dallas September 23 th, 2011 Outline 1 Overview 2 Metadata Extraction Tool Overview 3 Hachoir

More information

DOWNLOAD OR READ : TOOLS FOR TEXT AND IMAGE ANALYSIS AN INTRODUCTION TO APPLIED SEMIOTICS PDF EBOOK EPUB MOBI

DOWNLOAD OR READ : TOOLS FOR TEXT AND IMAGE ANALYSIS AN INTRODUCTION TO APPLIED SEMIOTICS PDF EBOOK EPUB MOBI DOWNLOAD OR READ : TOOLS FOR TEXT AND IMAGE ANALYSIS AN INTRODUCTION TO APPLIED SEMIOTICS PDF EBOOK EPUB MOBI Page 1 Page 2 tools for text and image analysis an introduction to applied semiotics tools

More information

INSTITUTO SUPERIOR TÉCNICO

INSTITUTO SUPERIOR TÉCNICO INSTITUTO SUPERIOR TÉCNICO DEPARTAMENTO DE ENGENHARIA INFORMÁTICA FORENSICS CYBER-SECURITY MEIC, METI Lab Guide II Evidence Examination 2015/2016 nuno.m.santos@tecnico.ulisboa.pt 1 Introduction This guide

More information

How to make a PDF from outside Acrobat

How to make a PDF from outside Acrobat How to make a PDF from outside The basics of PDF technology 1. What software do you need to make a PDF? A. If you purchase and install (Standard or Professional) i. Any document that can be printed can

More information

ID: Sample Name: ff2c8cadaa0fd8da6138cce6fce37e001f53a5d9ceccd67945b15ae273f4d751.evaljs.js Cookbook: default.jbs Time: 16:44:00 Date:

ID: Sample Name: ff2c8cadaa0fd8da6138cce6fce37e001f53a5d9ceccd67945b15ae273f4d751.evaljs.js Cookbook: default.jbs Time: 16:44:00 Date: ID: 33355 Sample Name: ff2c8cadaa0fd8da138ccefce3e001f53a5dceccd45b15ae23f4d51.evaljs.js Cookbook: default.jbs Time: 1:44:00 Date: 04//201 Version: 20.0.0 Table of Contents Table of Contents Analysis Report

More information

THE LIFE OF AN ENTREPRENEUR IN 90 PAGES PDF EBOOK EPUB MOBI

THE LIFE OF AN ENTREPRENEUR IN 90 PAGES PDF EBOOK EPUB MOBI DOWNLOAD OR READ : THE LIFE OF AN ENTREPRENEUR IN 90 PAGES PDF EBOOK EPUB MOBI Page 1 Page 2 the life of an entrepreneur in 90 pages pdf the life of an entrepreneur in 90 pages Take your PDF tools to go.

More information

Java Oriented Object Programming II Files II - Binary I/O Lesson 3

Java Oriented Object Programming II Files II - Binary I/O Lesson 3 Java Oriented Object Programming II Files II - Binary I/O Lesson 3 The objectives in this lesson are: Convert Binary to Hexadecimals (vice versa) Understand Binary Code Use Hex Editors Explain how Streams

More information

EXPLOIT KITS. Tech Talk - Fall Josh Stroschein - Dakota State University

EXPLOIT KITS. Tech Talk - Fall Josh Stroschein - Dakota State University EXPLOIT KITS Tech Talk - Fall 2016 Josh Stroschein - Dakota State University Delivery Methods Spam/Spear-phishing Delivery Methods Spam/Spear-phishing Office Documents Generally refer to MS office suite

More information

DESIGN OF THE FILE SEPARATION STRUCTURE FOR EXCEL VBA PROGRAM

DESIGN OF THE FILE SEPARATION STRUCTURE FOR EXCEL VBA PROGRAM DESIGN OF THE FILE SEPARATION STRUCTURE FOR EXCEL VBA PROGRAM Seung Ju Jang College of ICT Engineering, Dong-Eui University Korea sjjang@deu.ac.kr ABSTRACT We use a lot of Excel programs in our daily work.

More information

Shellcode Analysis. Chapter 19

Shellcode Analysis. Chapter 19 Shellcode Analysis Chapter 19 What is Shellcode Shellcode a payload of raw executable code, attackers use this code to obtain interactive shell access. A binary chunk of data Can be generally referred

More information

National Aeronautics and Space Admin. - FTP Site Statistics. Top 20 Directories Sorted by Disk Space

National Aeronautics and Space Admin. - FTP Site Statistics. Top 20 Directories Sorted by Disk Space National Aeronautics and Space Admin. - FTP Site Statistics Property Value FTP Server ftp.hq.nasa.gov Description National Aeronautics and Space Admin. Country United States Scan Date 26/Apr/2014 Total

More information

DOWNLOAD OR READ : CONVERTING WORD DOCUMENT TO FORM PDF EBOOK EPUB MOBI

DOWNLOAD OR READ : CONVERTING WORD DOCUMENT TO FORM PDF EBOOK EPUB MOBI DOWNLOAD OR READ : CONVERTING WORD DOCUMENT TO FORM PDF EBOOK EPUB MOBI Page 1 Page 2 converting word document to form converting word document to pdf converting word document to form How Do I improve

More information

ID: Sample Name: Commercial Card Services CTO Quality Control Checklist v9.docm Cookbook: defaultwindowsofficecookbook.jbs Time: 15:55:50 Date:

ID: Sample Name: Commercial Card Services CTO Quality Control Checklist v9.docm Cookbook: defaultwindowsofficecookbook.jbs Time: 15:55:50 Date: ID: 244 Sample Name: Commercial Card Services CTO Quality Control Checklist v9.docm Cookbook: defaultwindowsofficecookbook.jbs Time: 15:55:50 Date: 05/10/201 Version: 24.0.0 Fire Opal Table of Contents

More information

Xerox Mobile Print Portal 1.3 User Guide for BlackBerry

Xerox Mobile Print Portal 1.3 User Guide for BlackBerry Xerox Mobile Print Portal 1.3 User Guide for BlackBerry 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks or trademarks of Xerox Corporation in the US and/or other

More information

Example 1: Denary = 1. Answer: Binary = (1 * 1) = 1. Example 2: Denary = 3. Answer: Binary = (1 * 1) + (2 * 1) = 3

Example 1: Denary = 1. Answer: Binary = (1 * 1) = 1. Example 2: Denary = 3. Answer: Binary = (1 * 1) + (2 * 1) = 3 1.1.1 Binary systems In mathematics and digital electronics, a binary number is a number expressed in the binary numeral system, or base-2 numeral system, which represents numeric values using two different

More information

Introduction. Secondary Storage. File concept. File attributes

Introduction. Secondary Storage. File concept. File attributes Introduction Secondary storage is the non-volatile repository for (both user and system) data and programs As (integral or separate) part of an operating system, the file system manages this information

More information

ID: Sample Name: Commercial Card Services CTO Quality Control Checklist v9.docm Cookbook: defaultwindowsofficecookbook.jbs Time: 15:52:31 Date:

ID: Sample Name: Commercial Card Services CTO Quality Control Checklist v9.docm Cookbook: defaultwindowsofficecookbook.jbs Time: 15:52:31 Date: ID: 244 Sample Name: Commercial Card Services CTO Quality Control Checklist v9.docm Cookbook: defaultwindowsofficecookbook.jbs Time: 15:52:31 Date: 05/10/201 Version: 24.0.0 Fire Opal Table of Contents

More information

DOWNLOAD OR READ : THE IMAGE OF THE POPULAR FRONT PDF EBOOK EPUB MOBI

DOWNLOAD OR READ : THE IMAGE OF THE POPULAR FRONT PDF EBOOK EPUB MOBI DOWNLOAD OR READ : THE IMAGE OF THE POPULAR FRONT PDF EBOOK EPUB MOBI Page 1 Page 2 the image of the popular front the image of the pdf the image of the popular front Software to create pdf, convert pdf,

More information

PlatPal: Detecting Malicious Documents with Platform Diversity

PlatPal: Detecting Malicious Documents with Platform Diversity PlatPal: Detecting Malicious Documents with Platform Diversity Meng Xu and Taesoo Kim Georgia Institute of Technology 1 Malicious Documents On the Rise 2 3 4 Adobe Components Exploited Element parser JavaScript

More information

How to Reduce Large Excel File Size (Ultimate Guide)

How to Reduce Large Excel File Size (Ultimate Guide) Handling a large file is important as it takes a huge amount of time to transfer. A large file takes too much time to open. Any kind of change in a large file takes a long time to update. So, reducing

More information

Threat Modelling Adobe PDF

Threat Modelling Adobe PDF Threat Modelling Adobe PDF Ron Brandis and Luke Steller Command, Control, Communications and Intelligence Division Defence Science and Technology Organisation ABSTRACT PDF documents are increasingly being

More information

AD07 A Tool to Automate TFL Bundling

AD07 A Tool to Automate TFL Bundling AD07 A Tool to Automate TFL Bundling Mark Crangle ICON Clinical Research Introduction Typically, requirement for a TFL package is a bookmarked PDF file with a table of contents Often this means combining

More information

Implementation of the Excel VBA Password ModifyingFunction

Implementation of the Excel VBA Password ModifyingFunction Implementation of the Excel VBA Password ModifyingFunction Jang, Seung-Ju Department of Computer Engineering, Dongeui University Abstract : In this paper, if the Excel VBA password is set, this paper implements

More information

Microsoft Excel 2007 Macros and VBA

Microsoft Excel 2007 Macros and VBA Microsoft Excel 2007 Macros and VBA With the introduction of Excel 2007 Microsoft made a number of changes to the way macros and VBA are approached. This document outlines these special features of Excel

More information

ID: Sample Name: emotet.exe Cookbook: defaultwindowsofficecookbook.jbs Time: 07:07:14 Date: 07/11/2017 Version:

ID: Sample Name: emotet.exe Cookbook: defaultwindowsofficecookbook.jbs Time: 07:07:14 Date: 07/11/2017 Version: ID: 3626 Sample Name: emotet.exe Cookbook: defaultwindowsofficecookbook.jbs Time: 0:0:14 Date: 0/11/201 Version: 20.0.0 Table of Contents Table of Contents Analysis Report Overview Information Detection

More information

DOWNLOAD OR READ : WHEN YOU ARE CONVERTED PDF EBOOK EPUB MOBI

DOWNLOAD OR READ : WHEN YOU ARE CONVERTED PDF EBOOK EPUB MOBI DOWNLOAD OR READ : WHEN YOU ARE CONVERTED PDF EBOOK EPUB MOBI Page 1 Page 2 when you are converted when you are converted pdf when you are converted JPG to PDF Free Online Converter Our JPG to PDF converter

More information

Vulnerability Report

Vulnerability Report Vulnerability Report Attacks bypassing the signature validation in PDF Vladislav Mladenov, Christian Mainka, Karsten Meyer zu Selhausen, Martin Grothe, Jörg Schwenk November 08, 2018 Chair for Network

More information

HUAWEI TECHNOLOGIES CO., LTD. Huawei FireHunter6000 series

HUAWEI TECHNOLOGIES CO., LTD. Huawei FireHunter6000 series HUAWEI TECHNOLOGIES CO., LTD. Huawei 6000 series Huawei 6000 series can detect APT (Advanced Persistent Threat) attacks, which altogether exploit multiple techniques (including zero-day vulnerabilities

More information

Lesson 5: Multimedia on the Web

Lesson 5: Multimedia on the Web Lesson 5: Multimedia on the Web Lesson 5 Objectives Define objects and their relationships to multimedia Explain the fundamentals of C, C++, Java, JavaScript, JScript, C#, ActiveX and VBScript Discuss

More information

ID: Sample Name: Swift details.xls Cookbook: defaultwindowsofficecookbook.jbs Time: 17:14:48 Date: 21/06/2018 Version: 22.0.

ID: Sample Name: Swift details.xls Cookbook: defaultwindowsofficecookbook.jbs Time: 17:14:48 Date: 21/06/2018 Version: 22.0. ID: 64992 Sample Name: Swift details.xls Cookbook: defaultwindowsofficecookbook.jbs Time: 17::48 Date: 21/06/2018 Version: 22.0.0 Table of Contents Analysis Report Overview Information Detection Confidence

More information

SQL Parsers with Message Analyzer. Eric Bortei-Doku

SQL Parsers with Message Analyzer. Eric Bortei-Doku SQL Parsers with Message Analyzer Eric Bortei-Doku Agenda Message Analyzer Overview Simplified Operation Message Analyzer Parsers Overview Desktop UI Demos Analyzing Local Ping Traffic Analyzing a Capture

More information

DOWNLOAD OR READ : WORD AND IMAGE IN ARTHURIAN LITERATURE PDF EBOOK EPUB MOBI

DOWNLOAD OR READ : WORD AND IMAGE IN ARTHURIAN LITERATURE PDF EBOOK EPUB MOBI DOWNLOAD OR READ : WORD AND IMAGE IN ARTHURIAN LITERATURE PDF EBOOK EPUB MOBI Page 1 Page 2 word and image in arthurian literature word and image in pdf word and image in arthurian literature pdf converter,

More information

Microsoft PowerPoint. - Package for CD Feature (Windows & Macintosh) - Make Movie Feature (Macintosh Only)

Microsoft PowerPoint. - Package for CD Feature (Windows & Macintosh) - Make Movie Feature (Macintosh Only) Microsoft PowerPoint - Package for CD Feature (Windows & Macintosh) - Make Movie Feature (Macintosh Only) ITS / Center for Teaching & Learning Dr. Luanne Fose Revised October 23, 2007 PowerPoint for Windows

More information

CONVERT EXCEL DOCUMENT INTO

CONVERT EXCEL DOCUMENT INTO page 1 / 6 page 2 / 6 convert excel document into pdf Plan features No download or software install required Convert almost anything to PDF Combine multiple files into a single PDF Convert PDF to Word

More information

Excel Vba Manually Update Links Automatically On Open File Ignore

Excel Vba Manually Update Links Automatically On Open File Ignore Excel Vba Manually Update Links Automatically On Open File Ignore Powerpoint VBA to update links on excel files open by someone else without alerts So I would have to update manually each link so it will

More information

OPSWAT Metadefender. Superior Malware Threat Prevention and Analysis

OPSWAT Metadefender. Superior Malware Threat Prevention and Analysis OPSWAT Metadefender Superior Malware Threat Prevention and Analysis OPSWAT Products Threat protection and security Threat prevention and analysis 30+ anti-malware engines 90+ data sanitization engines

More information

Heaps of Heap-based Memory Attacks

Heaps of Heap-based Memory Attacks Heaps of Heap-based Memory Attacks Kevin Leach kleach2@gmu.edu Center for Secure Information Systems 3 October 2012 K. Leach (CSIS) Heaps of Heap-based Memory Attacks 3 October 2012 1 / 23 Goals During

More information

DOWNLOAD OR READ : THE WORD OF A LIAR PDF EBOOK EPUB MOBI

DOWNLOAD OR READ : THE WORD OF A LIAR PDF EBOOK EPUB MOBI DOWNLOAD OR READ : THE WORD OF A LIAR PDF EBOOK EPUB MOBI Page 1 Page 2 the word of a liar the word of a pdf the word of a liar Free PDF to Word Converter is an easy to use utility that does swift conversions

More information

Pearson Higher Education - FTP Site Statistics. Top 20 Directories Sorted by Disk Space

Pearson Higher Education - FTP Site Statistics. Top 20 Directories Sorted by Disk Space Pearson Higher Education - FTP Site Statistics Property Value FTP Server ftp.awl.com Description Pearson Higher Education Country United States Scan Date 11/Jul/2014 Total Dirs 5,605 Total Files 29,960

More information

Lesson 5: Multimedia on the Web

Lesson 5: Multimedia on the Web Lesson 5: Multimedia on the Web Learning Targets I can: Define objects and their relationships to multimedia Explain the fundamentals of C, C++, Java, JavaScript, JScript, C#, ActiveX and VBScript Discuss

More information

PrecisionID QR Code Barcode Font. User Manual

PrecisionID QR Code Barcode Font. User Manual PrecisionID QR Code Barcode Font User Manual PrecisionID QR Code Barcode Font Copyright 2018 PrecisionID.com All Rights Reserved Legal Notices Page 0 Installation... 2 Microsoft Windows... 2 Mac... 2 Other

More information

Secondary Storage (Chp. 5.4 disk hardware, Chp. 6 File Systems, Tanenbaum)

Secondary Storage (Chp. 5.4 disk hardware, Chp. 6 File Systems, Tanenbaum) Secondary Storage (Chp. 5.4 disk hardware, Chp. 6 File Systems, Tanenbaum) Secondary Stora Introduction Secondary storage is the non volatile repository for (both user and system) data and programs. As

More information

ADOBE 9A Adobe Acrobat Professional 8.0 ACE.

ADOBE 9A Adobe Acrobat Professional 8.0 ACE. ADOBE Adobe Acrobat Professional 8.0 ACE http://killexams.com/exam-detail/ QUESTION: 95 You are using PDFMaker to create PDF documents. You do NOT want the PDF documents to open automatically after they

More information

Quick Start Guide. Managing the Service. Converting Files and Folders

Quick Start Guide. Managing the Service. Converting Files and Folders PEERNET has been successfully installed as a Windows service on your computer. The mini-tutorials below are designed to get you converting files as soon as possible. Converting Files and Folders Convert

More information

Reference Services Division Presents. Saving & Printing

Reference Services Division Presents. Saving & Printing Reference Services Division Presents Saving & Printing Welcome to Saving & Printing. In this class, we will learn how to save and print in a Windows-based PC environment. Basic computer skills, including

More information

DOWNLOAD OR READ : THE WORD AND THE SPIRIT PDF EBOOK EPUB MOBI

DOWNLOAD OR READ : THE WORD AND THE SPIRIT PDF EBOOK EPUB MOBI DOWNLOAD OR READ : THE WORD AND THE SPIRIT PDF EBOOK EPUB MOBI Page 1 Page 2 the word and the spirit the word and the pdf the word and the spirit Free PDF to Word Converter is an easy to use utility that

More information

ID: Sample Name: Liste_az.docx Cookbook: defaultwindowsofficecookbook.jbs Time: 00:17:54 Date: 30/12/2017 Version:

ID: Sample Name: Liste_az.docx Cookbook: defaultwindowsofficecookbook.jbs Time: 00:17:54 Date: 30/12/2017 Version: ID: 41280 Sample Name: Liste_az.docx Cookbook: defaultwindowsofficecookbook.jbs Time: 00:17:54 Date: 30/12/2017 Version: 20.0.0 Table of Contents Table of Contents Analysis Report Overview Information

More information

PDF and Accessibility

PDF and Accessibility PDF and Accessibility Mark Gavin Appligent, Inc. January 11, 2005 Page 1 of 33 Agenda 1. What is PDF? a. What is it not? b. What are its Limitations? 2. Basic Drawing in PDF. 3. PDF Reference Page 2 of

More information

Desktop Crawls. Document Feeds. Document Feeds. Information Retrieval

Desktop Crawls. Document Feeds. Document Feeds. Information Retrieval Information Retrieval INFO 4300 / CS 4300! Web crawlers Retrieving web pages Crawling the web» Desktop crawlers» Document feeds File conversion Storing the documents Removing noise Desktop Crawls! Used

More information

EXCELLENT ACADEMY OF ENGINEERING. Telephone: /

EXCELLENT ACADEMY OF ENGINEERING. Telephone: / Common file extensions that are good to know, organized by file format. Text Files.doc.log.msg.rtf.txt.wpd.wps Microsoft Word Document Log File Mail Message Rich Text Format Text File WordPerfect Document

More information

Jsunpack-n: Network Edition. Blake Hartstein Rapid Response Engineer VeriSign idefense

Jsunpack-n: Network Edition. Blake Hartstein Rapid Response Engineer VeriSign idefense Jsunpack-n: Network Edition Blake Hartstein blake@jeek.org Rapid Response Engineer VeriSign idefense Outline Attacker Attacker s Perspective Defender s Perspective Jsunpack-n Features and Release Problem

More information

Datasheet Version V7R1M0

Datasheet Version V7R1M0 Datasheet Version V7R1M0 CoolSpools Datasheet V7R1 Page: 1 Overview CoolSpools is a powerful but highly cost-effective information management toolkit for IBM system i. CoolSpools helps you give your users

More information

ID: Sample Name: fly.jse Cookbook: default.jbs Time: 18:17:26 Date: 11/11/2017 Version:

ID: Sample Name: fly.jse Cookbook: default.jbs Time: 18:17:26 Date: 11/11/2017 Version: ID: 371 Sample Name: fly.jse Cookbook: default.jbs Time: 1:17:2 Date: 11/11/2017 Version: 20.0.0 Table of Contents Table of Contents Analysis Report Overview Information Detection Confidence Classification

More information

BULK ANALYSIS OF MALICIOUS PDF DOCUMENTS. by Shauna M. Policicchio B.S., Saint Vincent College, 2013

BULK ANALYSIS OF MALICIOUS PDF DOCUMENTS. by Shauna M. Policicchio B.S., Saint Vincent College, 2013 BULK ANALYSIS OF MALICIOUS PDF DOCUMENTS by Shauna M. Policicchio B.S., Saint Vincent College, 2013 Submitted to the Graduate Faculty of the School of Information Science in partial fulfillment of the

More information

Introductory Visualizing Technology

Introductory Visualizing Technology Introductory Visualizing Technology Seventh Edition Chapter 3 File Management Learning Objectives 3.1 Create Folders to Organize Files 3.2 Explain the Importance of File Extensions 3.3 Explain the Importance

More information

DiskBoss DATA MANAGEMENT

DiskBoss DATA MANAGEMENT DiskBoss DATA MANAGEMENT Duplicate Files Search Version 9.1 Apr 2018 www.diskboss.com info@flexense.com 1 1 DiskBoss Overview DiskBoss is an automated, policy-based data management solution allowing one

More information

Image coding and compression

Image coding and compression Image coding and compression Robin Strand Centre for Image Analysis Swedish University of Agricultural Sciences Uppsala University Today Information and Data Redundancy Image Quality Compression Coding

More information

VISUAL BASIC 2 EDITOR

VISUAL BASIC 2 EDITOR VISUAL BASI 2 EDITOR hapter SYS-ED/ OMPUTER EDUATION TEHNIQUES, IN. Objectives You will learn: How to edit code in the. How to create, open, and access project(s). How to edit scripts and use the code

More information

M1-R4: IT TOOLS AND BUSINESS SYSTEMS

M1-R4: IT TOOLS AND BUSINESS SYSTEMS M1-R4: IT TOOLS AND BUSINESS SYSTEMS NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the TEAR-OFF

More information

Learn Html Pdf Converter To Excel Software Full Version

Learn Html Pdf Converter To Excel Software Full Version Learn Html Pdf Converter To Excel Software Full Version to PDF converter. It lets you convert Word, Excel, or PowerPoint (PPT) docs to PDF with onebutton ease. Learn more about creating PDFs from Microsoft

More information

bbc Overview Adobe Acrobat SDK November 2006 Version 8.0

bbc Overview Adobe Acrobat SDK November 2006 Version 8.0 bbc Overview Adobe Acrobat SDK November 2006 Version 8.0 2006 Adobe Systems Incorporated. All rights reserved. Adobe Acrobat SDK 8.0 Overview for Microsoft Windows, Mac OS, Linux, and UNIX Edition 1.0,

More information

THE AMERICAN LAW INSTITUTE Continuing Legal Education. Adobe Acrobat for Lawyers October 4, 2017 Video Webcast Studio Recorded August 3, 2017

THE AMERICAN LAW INSTITUTE Continuing Legal Education. Adobe Acrobat for Lawyers October 4, 2017 Video Webcast Studio Recorded August 3, 2017 1 THE AMERICAN LAW INSTITUTE Continuing Legal Education Adobe Acrobat for Lawyers October 4, 2017 Video Webcast Studio Recorded August 3, 2017 By Craig Brody C. Brody Associates, LLC Philadelphia, Pennsylvania

More information

White Paper. New Gateway Anti-Malware Technology Sets the Bar for Web Threat Protection

White Paper. New Gateway Anti-Malware Technology Sets the Bar for Web Threat Protection White Paper New Gateway Anti-Malware Technology Sets the Bar for Web Threat Protection The latest version of the flagship McAfee Gateway Anti-Malware technology adapts to new threats and plans for future

More information

PEERNET File Conversion Center

PEERNET File Conversion Center PEERNET File Conversion Center Automated Document Conversion Using File Conversion Center With Task Scheduler OVERVIEW The sample is divided into two sections: The following sample uses a batch file and

More information

Brief Description of GruanToolRs92 (gt92) 1 Installation. 1.1 System requirements for running GruanToolRS92: 1.2 Download and install Java

Brief Description of GruanToolRs92 (gt92) 1 Installation. 1.1 System requirements for running GruanToolRS92: 1.2 Download and install Java Brief Description of GruanToolRs92 (gt92) (Version 0.8.23 2018-01-04 16:36:30) The tool gt92 is a Java-based command-line utility. It provides possibilities for converting and extracting data-tables and

More information

bbc Adobe LiveCycle Content Services Mobile System requirements APPLIES TO Server CONTENTS iphone License information

bbc Adobe LiveCycle Content Services Mobile System requirements APPLIES TO Server CONTENTS iphone License information Getting Started Guide Adobe LiveCycle Content Services Mobile APPLIES TO Adobe LiveCycle Content Services Mobile for iphone April 2010 Adobe LiveCycle Content Services Mobile enables you to use your Apple

More information

Hackveda Training - Ethical Hacking, Networking & Security

Hackveda Training - Ethical Hacking, Networking & Security Hackveda Training - Ethical Hacking, Networking & Security Day1: Hacking windows 7 / 8 system and security Part1 a.) Windows Login Password Bypass manually without CD / DVD b.) Windows Login Password Bypass

More information

Contact Information. Contact Center Operating Hours. Other Contact Information. Contact Monday through Thursday Friday

Contact Information. Contact Center Operating Hours. Other Contact Information. Contact Monday through Thursday Friday Contact Information Contact Center Operating Hours Contact Monday through Thursday Friday Phone: 1.801.796.0944 8 AM 5 PM Eastern Time 8 AM 3 PM Eastern Time Online chat: http://support.paraben.com 10

More information

ScholarOne Manuscripts. Author File Upload Guide

ScholarOne Manuscripts. Author File Upload Guide ScholarOne Manuscripts Author File Upload Guide 7-August-2017 Clarivate Analytics ScholarOne Manuscripts Author File Upload Guide Page i Table of Contents INTRODUCTION... 1 SUPPORTED FILE TYPES... 1 HOW

More information

k-depth Mimicry Attack to Secretly Embed Shellcode into PDF Files

k-depth Mimicry Attack to Secretly Embed Shellcode into PDF Files k-depth Mimicry Attack to Secretly Embed Shellcode into PDF Files Jaewoo Park and Hyoungshick Kim Department of Software, Sungkyunkwan University 2066 Seobu-ro, Suwon, Republic of Korea {bluereaper,hyoung}@skku.edu

More information

Office Suites Seminar

Office Suites Seminar - 1 - Seminar a Bowie Senior Center Seminar, July 2007 Teacher: Eric Hein (hein1@verizon.net) Download the seminar slides: Start Internet_Explorer go to http://home.comcast.net/~bscclub/training.htm right-click

More information

PDF PDF PDF PDF PDF internals PDF PDF

PDF PDF PDF PDF PDF internals PDF PDF PDF Table of Contents Creating a simple PDF file...3 How to create a simple PDF file...4 Fonts explained...8 Introduction to Fonts...9 Creating a simple PDF file 3 Creating a simple PDF file Creating a

More information

Getting started 7. Setting properties 23

Getting started 7. Setting properties 23 Contents 1 2 3 Getting started 7 Introducing Visual Basic 8 Installing Visual Studio 10 Exploring the IDE 12 Starting a new project 14 Adding a visual control 16 Adding functional code 18 Saving projects

More information

Anti-Virus Comparative. Factsheet Business Test (August-September 2018) Last revision: 11 th October

Anti-Virus Comparative. Factsheet Business Test (August-September 2018) Last revision: 11 th October Anti-Virus Comparative Factsheet Business Test Language: English August-September 2018 Last revision: 11 th October 2018 https:// - 1 - Introduction This is a short fact sheet for our Business Main-Test

More information

Learn Well Technocraft

Learn Well Technocraft Section 1: Getting started The Word window New documents Document navigation Section 2: Editing text Working with text The Undo and Redo commands Cut, copy, and paste Find and replace Section 3: Text formatting

More information