Getting Started with Document Analysis using PDFStreamDumper
Scenario: A user in your organization reported that he accidentally clicked and downloaded a document from an unknown source. You are tasked with the investigation. Perform document analysis and answer the following questions:
Note: Use a separate machine to perform this task.
Question 1: Can you give the name of the vulnerability?
Question 2: Can you identify what vulnerability this exploit targeting to its victim?
Question 3: Can you identify what is inside the malicious stream?