Getting Started with Document Analysis using PDFStreamDumper

Read Lab Instruction

Scenario: A user in your organization reported that he accidentally clicked and downloaded a document from an unknown source. You are tasked with the investigation. Perform document analysis and answer the following questions:

Note: Use a separate machine to perform this task.

Tool: PDFStreamDumper

Question 1: Can you give the name of the vulnerability?

Question 2: Can you identify what vulnerability this exploit targeting to its victim?

Question 3: Can you identify what is inside the malicious stream?