{"id":839,"date":"2013-09-02T19:43:00","date_gmt":"2013-09-02T19:43:00","guid":{"rendered":"https:\/\/www-new.brucon.org\/2018\/2013\/09\/02\/training-in-the-spotlight-hacking-pdf-by-didier-stevens\/"},"modified":"2013-09-02T19:43:00","modified_gmt":"2013-09-02T19:43:00","slug":"training-in-the-spotlight-hacking-pdf-by-didier-stevens","status":"publish","type":"post","link":"https:\/\/archive.brucon.org\/2018\/2013\/09\/02\/training-in-the-spotlight-hacking-pdf-by-didier-stevens\/","title":{"rendered":"Training in the spotlight: Hacking PDF by Didier Stevens"},"content":{"rendered":"<div dir=\"ltr\" style=\"text-align: left\"><a href=\"http:\/\/1.bp.blogspot.com\/-Fnv28aLpjrw\/Uh4QTE9JqqI\/AAAAAAAAFiM\/xmAjVo_krH0\/s1600\/spotlights.jpg\" style=\"clear: left;float: left;margin-bottom: 1em;margin-right: 1em\"><img border=\"0\" height=\"215\" src=\"http:\/\/1.bp.blogspot.com\/-Fnv28aLpjrw\/Uh4QTE9JqqI\/AAAAAAAAFiM\/xmAjVo_krH0\/s320\/spotlights.jpg\" width=\"320\" \/><\/a>We have some great&nbsp;<a href=\"http:\/\/2013.brucon.org\/index.php\/Training\" target=\"_blank\">trainings<\/a>&nbsp;lined up for you at BruCON this year.<br \/>Just to make it even harder for you to choose one, we will put some of these trainings in the spotlight.<\/p>\n<p>The second training is&nbsp;<a href=\"http:\/\/2013.brucon.org\/index.php\/Training_PDF\" target=\"_blank\">Hacking PDF<\/a>,&nbsp;taught by Didier Stevens.&nbsp;Didier is a pioneer in malicious PDF document research, and has developed several <a href=\"http:\/\/blog.didierstevens.com\/\" target=\"_blank\">tools<\/a> to help with the analysis of malicious PDF documents. Steven on this unique training:<\/p>\n<div style=\"font-family: Helvetica;margin-bottom: 10px\"><i><span style=\"font-size: x-small\">&#8220;What do you want from training? I want to gain knowledge. I designed my \u201cHacking PDF\u201d training with this goal in mind.<\/span><\/i><\/div>\n<div style=\"font-family: Helvetica;margin-bottom: 10px\"><i><span style=\"font-size: x-small\">\u201cHacking PDF\u201d is a 2-day training focusing on the PDF language, not on reversing PDF readers. By attending this training, you will first acquire knowledge about the PDF language. And then we will use this knowledge to analyze malicious PDFs (day 1) and create PDFs for fun and profit (day 2).<\/span><\/i><\/div>\n<div style=\"font-family: Helvetica;margin-bottom: 10px\"><i><span style=\"font-size: x-small\">Learning to use tools is nice, and learning new skills is interesting. But I want more. I also want to get a deep understanding of the subject. Because with this knowledge, I can develop new tools and invent new techniques.<\/span><\/i><\/div>\n<div style=\"font-family: Helvetica;margin-bottom: 10px\"><i><span style=\"font-size: x-small\">On day one I explain the fundamentals of the PDF language. We take a look at several features of the language that malware authors use and abuse. And then we start analyzing PDFs. You learn to use my tools pdfid and pdf-parser on 20 simple PDF exercises. The exercise is to find the malicious behavior of the PDF, the goal is to gain understanding of PDF malware. And then we move on to the real deal: analyzing real, in-the-wild PDF malware.<\/span><\/i><\/div>\n<div style=\"font-family: Helvetica;margin-bottom: 10px\"><i><span style=\"font-size: x-small\">On day two we use our understanding of the PDF language and PDF malware to create our own PDF files and modify existing PDF files. This is done with pure Python tools and other free tools. Adobe products are not used in this training, except to view PDFs. We will learn to do simple and smart fuzzing of PDFs, create PDFs that exploit vulnerabilities in PDF readers, embed files and PDFs, and a lot of other interesting hacks \u2026&nbsp;<\/span><\/i><\/div>\n<div style=\"font-family: Helvetica;margin-bottom: 10px\"><span style=\"font-size: x-small\"><i>You can find a \u201cHacking PDF\u201d slideshow here:&nbsp;<\/i><i><a href=\"http:\/\/www.slideshare.net\/DidierStevens\/teaser-hackingpdfslides\">http:\/\/www.slideshare.net\/DidierStevens\/teaser-hackingpdfslides<\/a><\/i><\/span><\/div>\n<div style=\"font-family: Helvetica;margin-bottom: 10px\"><i><span style=\"font-size: x-small\">There are not many pre-requisites for this training:<\/span><\/i><\/div>\n<ol>\n<li style=\"font-family: Helvetica;margin: 0px 0px 10px\"><i><span style=\"font-size: x-small\">You don\u2019t need to know anything about PDF, I will teach you what we need to know.<\/span><\/i><\/li>\n<li style=\"font-family: Helvetica;margin: 0px 0px 10px\"><i><span style=\"font-size: x-small\">We use Python scripts, but you don\u2019t need to be a Python programmer. We will modify existing scripts, so a bit of programming knowledge like if statements and loops is enough.<\/span><\/i><\/li>\n<li style=\"font-family: Helvetica;margin: 0px 0px 10px\"><i><span style=\"font-size: x-small\">Not need to understand assembly or shellcode, we use a shellcode emulator. And I will provide you the shellcode for day 2, you do not need to write it yourself.<\/span><\/i><\/li>\n<li style=\"font-family: Helvetica;margin: 0px 0px 10px\"><i><span style=\"font-size: x-small\">You need to be at ease with the command-line<\/span><\/i><\/li>\n<li style=\"font-family: Helvetica;margin: 0px 0px 10px\"><i><span style=\"font-size: x-small\">A security mindset is an advantage ;-)&#8221;<\/span><\/i><\/li>\n<\/ol>\n<div style=\"font-family: 'Times New Roman';font-size: 11px;margin-bottom: 10px;min-height: 12px\"><\/div>\n<p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>We have some great&nbsp;trainings&nbsp;lined up for you at BruCON this year.Just to make it even harder for you to choose one, we will put some of these trainings in the spotlight. The second training is&nbsp;Hacking PDF,&nbsp;taught by Didier Stevens.&nbsp;Didier is a pioneer in malicious PDF document research, and has developed several tools to help with the analysis of malicious PDF documents. Steven on this unique training: &#8220;What do you want from training? I want to&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-839","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized"},"menu_order":0,"_links":{"self":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts\/839","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/comments?post=839"}],"version-history":[{"count":0,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts\/839\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/media?parent=839"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/categories?post=839"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/tags?post=839"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}