PDF Object Streams, (Mon, Nov 11th)

The first thing to do, when analyzing a potentially malicious PDF, is to look for the /Encrypt name as explained in diary entry Analyzing an Encrypted Phishing PDF.

Loading

Leave a Reply

Your email address will not be published. Required fields are marked *

en_USEnglish