Description:
In this video, we see a demo of how one can inject the Collab getIcon exploit into existing PDF files. The author downloads a legitimate PDF from a website and then injects the exploit into it. Once a victim open this infected file, the exploit run and then binds a shell to port 4444 on the victim computer.
You can download the Acrobat Reader - Collab getIcon universal exploiter from here. The zip file contains the source code and detailed description of how to go about.
Also, you can download the PDFInjector tool show in the demo from here.The scary thing about PDF exploits is that most people will never think twice before opening a PDF file they might receive over email. After all, most people have only been warned about EXEs received in email and that they should not execute them. Also, because of the fact that PDF exploits are relatively new, most people aren't aware of the danger.
Thanks go out to Keith Lee (keith.lee2012 [] gmail [] com) for creating and posting this video on SecurityTube! I would highly recommend downloading the exploit above and try it out.
Tags: tools ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Comments:
It seems the links are not working (obvious for milw0rm) but also nok for google code for pdfinjector.
paste new links please