Security of Information, Threat Intelligence, Hacking, Offensive Security, Pentest, Open Source, Hackers Tools, Leaks, Pr1v8, Premium Courses Free, etc

Wednesday, January 20, 2016

PDF Analysis Tool - peepdf



peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful or not.

The aim of this tool is to provide all the necessary components that a security researcher could need in a PDF analysis without using 3 or 4 tools to make all the tasks. With peepdf it’s possible to see all the objects in the document showing the suspicious elements, supports all the most used filters and encodings, it can parse different versions of a file, object streams and encrypted files. With the installation of Spidermonkey and Libemu it provides Javascript and shellcode analysis wrappers too. Apart of this it’s able to create new PDF files and to modify existent ones.


Functionalities:

Analysis:

ÂşDecodings: hexadecimal, octal, name objects
ÂşMore used filters
ÂşReferences in objects and where an object is referenced
ÂşStrings search (including streams)
ÂşPhysical structure (offsets)PDF Analysis Tool: peepdf
ÂşLogical tree structure
ÂşMetadata
ÂşModifications between versions (changelog)
ÂşCompressed objects (object streams)
ÂşAnalysis and modification of Javascript (Spidermonkey): unescape, replace, join
ÂşShellcode analysis (Libemu python wrapper, pylibemu)
ÂşVariables (set command)
ÂşExtraction of old versions of the document
ÂşEasy extraction of objects, Javascript code, shellcodes (>, >>, $>, $>>)
ÂşChecking hashes on VirusTotal

Creation/Modification:

ÂşBasic PDF creation
ÂşCreation of PDF with Javascript executed wen the document is opened
ÂşCreation of object streams to compress objects
ÂşEmbedded PDFs
ÂşStrings and names obfuscation
ÂşMalformed PDF output: without endobj, garbage in the header, bad header…
ÂşFilters modification
ÂşObjects modification

Execution modes:

ÂşSimple command line execution
ÂşPowerful interactive console (colorized or not)
ÂşBatch mode


Share:

0 comentários:

Post a Comment

Note: Only a member of this blog may post a comment.

Established in 2015. Offensive Sec Blog has been sharing security research, hacking tools, threat intelligence, and offensive security content since 2015.
Copyright © OffSec Blog | Powered by OffensiveSec
Design by OffSec | Built for the security community