When friends or others download it, it will open a listener (a rootkit) on their system and give us total control of their computer remotely. pdf file that can then be posted to our website. In this exploit, we will alter an existing. So, today we will exploit those computers with Adobe Reader 9 or earlier. But, most people are unaware of the security issues that Reader has experienced-and they fail to upgrade or patch it.Īccording to the antivirus software maker Avast, over 60 percent of computers have Adobe Reader 9 or earlier installed, even though the newest version is 11. Nearly every computer has some version of Adobe Reader on it for reading PDFs. Adobe continues to be behind the curve in security, and as a result, millions of client-side systems are vulnerable.Īmong the most widely used Adobe products is Reader. Security vulnerabilities is partly responsible for Apple forbidding Flash from their iOS. The ProblemĪdobe has had numerous security issues with their products, including Adobe Reader, Illustrator, Flash, and others. This time, we'll look at inserting a listener (rootkit) inside a PDF file, exploiting a vulnerability in Adobe's Reader. While web servers, database servers, and file servers have garnered increased protection, the client-side remains extremely vulnerable, and there is much to teach. Lately, I've been focusing more on client-side hacks.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |