Portable Document Format (PDF) Security Analysis and Malware Threats
|
|
|
- Daisy McCormick
- 10 years ago
- Views:
Transcription
1 Portable Document Format (PDF) Security Analysis and Malware Threats Alexandre Blonce - Eric Filiol 1 - Laurent Frayssignes Army Signals Academy - Virology and Cryptology Laboratory About Author(s) Eric Filiol is Head Scientist Officer of the Virology and Cryptology Laboratory at the French Army Signals Academy. Contact Details: c/o Ecole Supérieure et d Application des Transmissions, Laboratoire de virologie et de cryptologie, B.P. 18, Rennes, France, phone , fax , [email protected] Alexandre Blonce and Laurent Frayssignes are from the French Navy as IT-Security Officers and stayed at the Virology and Cryptology Laboratory in Rennes for this study. Keywords Malware, Portable Document Format, Document malware, security analysis, proof-of-concept, OUTLOOK.PDForm, W32/YOURDE virus. 1 Corresponding author
2 Portable Document Format (PDF) Security Analysis and Malware Threats Abstract Adobe Portable Document Format has become the most widespread and used document description format throughout the world. It is also a true programming language of its own, strongly dedicated to document creation and manipulation which has accumulated a lot of powerful programming features from version to version. Until now, no real, exploratory security analysis of the PDF and of its programming power with respect to malware attacks has been conducted. Only a very few cases of attacks are known, which exploit vulnerabilities in the management of external programming languages (Javacript, VBS). This paper presents an in-depth security analysis of the PDF programming features and capabilities, independently from any vulnerability. The aim is to exhaustively explore and evaluate the risk attached to PDF language-based malware which could successfully subvert some of PDF primitives in order to conduct malware based attacks. Along with a dedicated PDF document analysis and manipulation tool we have designed, this paper presents two proof-of-concepts on an algorithmic point of view, which clearly demonstrate the existence of such a risk. We also suggest some security measures at the users level to reduce this risk. Introduction The widespread use of any hardware or software makes necessary their security analysis, especially with respect to the malware hazard. Applications embed more and more powerful execution features and capabilities that may enable and favour the design, writing and spread of new malware. Those features are generally motivated by the commercial need to provide more interoperability with existing applications, to make sofware easier to install, to configure and to use. But the (too) rapid development of products by the software industry makes such security analysis very difficult to conduct in time; in most cases, as long as no problem occurs, no such true risk assessment is made on a technical, auditing basis, particularly with the potential attacker s approach in mind. The case of PDF documents (Portable Document Format) is probably symptomatic to that situation. The worldwide use of that multi-platform document format, due to its total portability and interoperability, whatever the platform we may consider, makes any potential security problem a very critical issue. But aside its extraordinary features that make this document format so popular, PDF document is more than a powerful document format. It is also a complete, programming language of its own, dedicated to document creation and manipulation, with relatively strong execution features. The question is to determine whether some of those features could be subverted or perverted by an attacker to design PDF document dedicated malware and thus create a new, worldwide threat. In this paper, we address the problem of the real security level with respect to PDF documents, at the PDF code level. Up to now, no true, deep study has been conducted about the security of PDF language. Only two security problems regarding application vulnerabilities are known and surprisingly they did not suggest any further security analysis. The vulnerabilities have been patched
3 and that is all. The algorithmic analysis of the PDF language philosophy and of its programming capabilities has never been conducted, at least publicly. We have conducted such a study and analysed the core execution capabilities of the PDF language that could be subverted and misused by attackers. The results is that the level of risk is far higher than expected. The main conclusion is that the extraordinary power of the PDF language, which provides flexibility, interoperability and easy-to-useness, may be a critical weakness as well. In order to validate and proove those security results, we have designed two proof-of-concepts among many possible other ones that have been successfully tested in operational conditions. They have clearly demonstrated that PDF could be efficiently used to attacks users through simple PDF documents, while simply using common PDF readers only. As a consequence, we suggest to limit some of the features allowed for PDF documents when working in critical environments where security is a priority. The paper is organized as follows. In the first section, we first present the PDF language on a functional basis, in particular in terms of the technical evolutions of the different version of this language. Next, the second section is devoted to the technical analysis of the PDF decription format language and we present the structure of any PDF document. Since no suitable tool to analyze and manipulate PDF documents was available, we have designed our own tool, called PDF StructAzer and we present it here. The third section deals with the PDF language security analysis. We first expose the few existing PDF-based malware threats and then we explore and classify PDF language primitives in order to identify those which represent a potential risk with respect to malware writing. Finally we address the few existing security mechanisms of PDF manipulation software. The fourth section presents two proof-of-concepts that have been designed in order to evaluate the level of risk in terms of actual attacks. Finally, we conclude by presenting some security measures to take in order to potentially prevent those attacks. Disclaimer.- The purpose of this paper is to present security analysis results regarding a critical risk which any IT experts and computer specialist must be aware of. Proof-of-concepts have been essential to validate our study since in many cases it is the only existing scientific approach to prove and convince people and particularly decision-makers. The codes of proof-of-concept will or course not be disclosed in any way and only an algorithmic description will be presented in this paper. The aim is to prevent any misuse of those critical data. Introduction to the PDF World The philosophy of the PDF language is to enable users to conveniently exchange and manipulate electronic documents in a reliable way, independently from any particular platform. This language inherits from the Adobe vector description language while offering more structured document than the latter, in particular by introducing objects, streams and a nested architecture. Lastly, the PDF language enables file execution contexts for an increasing interactivity and accessibility of documents. The main consequence is that PDF documents are indeed not inert data. PDF exhibits a wide range of features and advantages: it is an open, evolutive description format language which is considered as reliable and secure. As a consequence, it is considered in practice as a standard by most countries (industry and gouvernmental administration).
4 The PDF Document Model A PDF document can be defined as a collection of objects which describe how one or more pages must be displayed. This collection of objects can also consider additional interactive components and application data at a higher level. To manage these elements, PDF relies on the Adobe Imaging model inherited from the Postscript language. This general model enables to describe text, images... as an abstract model instead in terms of pixels. Objects and components are managed through page content streams which contain operators and operands. At a higher level, the page description is enabled by means of a language which complies to the Imaging model. Displaying a PDF files is a two-step process: the application first generate a document description in page description language, which is independent from the hardware; a program, which controls the chosen interface to render the document, will interpret the description produced in the previous step. These two steps can be operated independently both from time and space aspects, thus offering a powerful capability to exchange, store, print and display documents. PDF Functionalities The number of features and functionalities are so huge that it would be impossible to describe them all here. Let us just mention the most significant ones, especially in our analysis context. For more details, the reader can refer to (Adobe Systems Inc., 2004). PDF files are binary files encoded by default in bytes. Binary format instead of text format provides a far higher portability and prevent any loss of data. Moreover, to reduce the size of files, PDF supports a number of compression standards: JPEG and JPEG2000 for (color and/or black and white) image compression, CCITT-2 and 3, JBIG2 for monochromatic images, LZW compression for text, graphics and images. A PDF file must be seen as a flat representation of a data structure describing a collection of objects. Each object may refer to any other one in an arbitrary way. This means that the order of appearance of the objects whithin the file does not matter. In other words, access to any of the objects can be done randomly. For that purpose, any PDF file embeds a cross reference table which enable to access directly and randomly to any of these objects. This table is located at the end of the file. The use of such a table is essential to reduce the access time to any document object, whatever may be the size of this document (this can be compared to the RAM model). As far as security is concerned, PDF language and PDF management applications can use: data encryption (RC4 and AES algorithms),
5 data integrity (through hash functions), digital signature, including biometric-based signature. An important but critical feature of PDF comes from the fact that a document can be modified or updated in an incremental way. This means that modifications can be simply stored within the document leaving the original one, intact. Thus the saving time is proportional to the modification size and not to the document size; thus a great amount of time can be saved. But since we also can come back to original data by cancelling modifications (by just removing the part refering to the modification), any illegitimate user can recover some confidential information hidden whithin a PDF file (see Figure 1). Figure 1: Structure of an updated PDF file All this functionalities and some more programming oriented aspects, which will be presented later on, show that PDF language exhibits features that true programming languages possess: execution capabilities, various actions on the application environment. The noticeable difference is that PDF does not manage logical functions. Technical Analysis of PDF Language In this section, we are now going to explain how the internal structure of PDF file and how this structure is managed by the PDF language. This is essential to fully understand all these internals
6 mechanisms and which PDF languages primitives are involved to understand how a malware could subvert them. We just summarize here the main aspects while details can be found in (Adobe Systems Inc., 2004). Structure of PDF Files Any PDF file contains a least different sections, in the following order: the file header; this probably the most simple section. It is made of a single line which specifies the PDF language version (which range from 1.0 to 1.6); the file body, which generally contains the most part of the PDF code. This section is made of a list of objects which describes how the final document will look; the cross reference table; this table contains all the data required to the PDF management software (e.g. a reader) in order to access directly any document object without having to read throughout the file to find this object. For that purpose, each line in the table refers to a given object (more precisely an offset, in bytes, from the beginning of the document). The table always begins with the label xref (for cross ref). Then, sub-sections (one per file update; an original, unmodified file contains a single sub-section) are listed one after the another. Every sub-section begins with sub-section header made of two numbers on the same line. The first number identifies the first object in the current sub-section while the second number gives the number of objects in the current sub-section. Every line in a subsection contains 20 bytes (including the end of line character). Here is an example of a cross reference table which contains a single sub-section with 14 objects: xref f n n n n n n n n f n n n n
7 Lines ending with an n refer to objects in use while those ending with an f indicate that the object is free (it has been removed) and that its number can be used by another (future) object. We thus have two cases: either the object is used; in this case, the first group of ten digits describes the offset from the beginning of the file to the object (in bytes). This group of digits is most of the time padded with 0 at its beginning to fit the line 20-byte size. The next five digits are either n (the object is an original one and is not a reused object) or xxxxx n, where xxxxx is the generation number (the object is not an original one but a reused one) padded with 0 at its beginning; or the object has been freed; in this alternative case, the first 10 digits are The next five digits are used to memorize the generation number to give to a future new object (with a maximum of 65535; the object cannot then be reused). the trailer. Any PDF software management application always begins to read from the end of the file where this last section is located. The trailer contains different essential data, which are from the top to the bottom of the trailer: the number of objects contained in the file (field /Size), the ID of the file root document (field /Root), the offset (in bytes) of the cross reference table (the line just above the %%EOF line). Each of those sections contains the different objects which compose the document itself. In order to illustrate the internal structure of a PDF file, Table 1 presents an example of such a file. PDF as a Programming Language PDF is an object-oriented page description language. The body section contains all the objects used to represent the PDF document. These objects can belong to eight different classes: Boolean values, integers or float values, character strings (in ASCII or hexadecimal representation), labels, names, arrays, dictionaries which are arrays of object pairs (each pair is composed of a key and of a value attached to this key), streams, functions (printing optimization, graphic calculation... ),
8 %PDF 1.4 Header 5 0 ob j 1 0 ob j < << /Length 35 >> << /Type /Catalog stream /Outlines 2 0 R...Page markingoperators... /Pages 3 0 R endstream >> endob j endob j 6 0 ob j 2 0 ob j [/PDF] << /Type Outlines endob j < /Count 0 xre f Cross >> 0 7 Re f erence endob j f Table 3 0 ob j n << /Type /Pages Body n /Kids [4 0 R] n /Count n >> n endob j n < 4 0 ob j trailer Trailer << /Type /Page << /Size 7 /Parent 3 0 R /Root 1 0 R /MediaBox [ ] >> /Contents 5 0 R startxre f /Resources << /ProcSet 6 0 R >> 408 >> %%EOF < Endob j Table 1: Example of a PDF code (a single subsection with seven objects, the first is freed and cannot be reallocated) the NULL object. More complex structures can be build up with those objects. One very important feature is that objects or structures of objects can address, refer or call to resources (files, documents...) that are external to the file in which they currently are. The high level modularity provided by objects enables any PDF generating application to create its own objects structure and to store them inside a PDF file. Any other PDF application, which does not recognize those structures, will simply ignore them. Finally, it is essential to mention that PDF language does not use control structure (if, for, while... statements). This is the main difference with other classic programming languages.
9 PDF StructAzer Tool There exist many PDF file manipulation software (Adobe Acrobat, PDF Creator... ) but all these software work at the object level only. Unfortunately, it is necessary to work at a lower level the PDF code level when analyzing PDF programming features and capabilities. This is the reason why we have developed our own PDF file analysis tool, called PDF StructAzer (PDG Structure Analyzer for short). This software, whose front-end is depicted in Figure 2, enables to directly create a PDF file by really programming it. In other words, we can directly create such a file by writing it as a PDF program and then directly saving (interpreting) it as a PDF file. The main functions of this tool Figure 2: Front-end of the PDF StructAzer Tool are: analysis of the internal structure of PDF files (identifying and then picking it out), calculation on the cross reference table to accurately locate and manipulate every existing object, basic PDF programming. The reader will find in (Blonce - Filiol - Frayssignes, 2007) numerous examples how to use this tool to create/manipule PDF files. The PDF StructAzer Tool will be made available under Gnu Public Licence very soon.
10 Security Analysis of PDF Language Known PDF-based Threats PDF has always been considered as immune against malware since it is seen more as a description language and less or simply not as a manipulation one. Despite a few existing threats which have been identified since 2001, this perception has never really changed. Still now, antivirus software do not really analyze PDF documents. At least, three threats have been identified up to now: in 2001, a proof-of-concept called Outlook_PDFWorm or Peachy (Trend Micro, 2000) has been disclosed. This VBScript code spread through PDF documents sent as Microsoft Outlook attachments. Once the document is opened, instructions to play a game are displayed as well as a link to which the user is invited to click on. The latter action is running the malicious code embedded into the PDF document. However the attack is possible when using the commercial version of Adobe Acrobat (5 or higher) only and not just the Adobe Acrobat reader; in 2003, the W32.Yourde virus appeared and exploited a vulnerability in Acrobat (Adobe, 2003). Due to this vulnerability in the JavaScript parsing engine, a malicious PDF document can instruct Acrobat to write code into the user s Plug-ins folder. Any file in this folder that is developed to the Acrobat plug-in specification will automatically install and run when a user launches Acrobat. The W32.Yourde virus just dropped a Death.api, containing the virus replication code, into the folder C:\ProgramFiles\Adobe\Acrobat5. 0\Plug_ins and a Evil.fdf JavaScript file (on the C: volume), which operates as a virus launcher. This vulnerability, which again affected the full version of Acrobat 5, does not affect other Acrobat versions; a conceptual weakness has been disclosed in 2000 (Cert, 2000) and exploited in 2003 (O. Shezaf, 2003) regarding the ability of a Adobe reader to run malicious scripts on a victim s computer when (nearly any) browser activate a link like and uses Acrobat in embedded mode. This attacks exploits the XSS (Cross Site Scripting) attack technique. More recently, in december 2006 (J.-M. Laurio, 2007) another critical XSS attack through PDF documents has been disclosed. The main observation we can made is that most of the attacks are possible when using the full version of Adobe Acrobat only, and that security analysis of PDF document has always been restricted to existing attacks, and to vulnerabilities. No study has considered the security of the PDF language itself, up to now. Exploration and Classification of Potentially Dangerous PDF Functions From version to version, Adobe Systems Inc. has developed the PDF language towards more interactivity with the operating system, with other files and with networks. For that purpose, actions
11 can be launched either automatically or manually. But the PDF language quite like a postulate is still considered as a passive, secure file format since its most known features are those dedicated to document description more than to object manipulation. However, the PDF language contains new programming-like characteristics that can be subverted and misused by an attacker. What is probably the most interesting point is that each PDF characteristics is generally not dangerous enough alone, with respect to the PDF malware risk: only suitable, clever combined uses of PDF languages functions can produce dangerous PDF malware threats. During our exploratory analysis of the PDF primitives, we have identified two major kinds of actions that can be realised through those primitives: the OpenAction class, whose elements are operating actions whenever a PDF file is opened. In this case, the PDF directive /OpenAction 9 0 R will be used within the relevant object; the Action class, whose elements are operating actions on user s own action (e.g. activating a hypertext link). But it is possible to fool and trap the innocent user by using invisible forms (which are activated once the mouse cursor enters the invisible field), hypertext link... Since PDF version 1.2, generating actions has become easier with the concept of Trigger Events which makes possible to create large structures and trees of actions in which each action is link to other ones. Some of those functions are particularly sensitive with respect to misuse by malware writers. Let us summarize the most critical ones (among others) along with the possible misuse: the GoTo function which performs and manages deplacement within the active document, towards a specified destination. A valid destination can be a predetermined page or an object (graphics, hypertext link, annotation...). Here is an example of possible use: /A << /Type /Action /S /GoTo /D [2 0 R/FitR ] >> The destination is the object number 2 and the page zoom is tuned up. This command is potentially not too dangerous unless used with other critical functions. It can be used as a first step in a multi-step attack, in order to induce some user s action (e.g. to point the cursor to a file annotation, or an active, invisible or not, area, which executes some code when activated. the GoToR function which generalizes the GoTo function to resources that are outside the active document, in another PDF file. This external resource is then opened in place of the active document. This could be used to launch some external malicious code (e.g. logic bomb). The main risk lies in the fact that the command is not included in the external resources, thus making detection quite impossible. In the context of k ary malware (Filiol, 2007), this could be dramatically misused.
12 the GoToE is a special case of the GoToR function and enables to access any other PDF file which embedded or put as an appendix to the active PDF file. Embedded files can themselves contain another embedded files, thus piling up different files. << /Type /Action /S /GoToE /D (Chapter 1) /F (somefile.pdf) >> This can be misused to include some malicious code in a third or fourth level embedded file. the launch function can launch an application, open or print a document. This function accepts optional arguments with respect to Windows, Mac or Linux systems, to manage OS-specific actions/applications. In the following code: << /Type /OpenAction /S /Launch /F (/c/secretfiles/password.doc) /O (print) >> the misuse of the Launch function enables to eavesdrop the administrator s password file (a critical error) through the network printer, whenever the malicious PDF document is opened. The number of possible misuses for this command is quite infinite (run malicious code, eavesdrop data, steal data, subvert legitimate application...). This is why the Launch function is probably the most critical one. the URI function which enables to access remote resources by mean of an Universal Resource Indicator (hypertext) link. << /Type /OpenAction /S /URI /URI ( >>
13 This example clearly shows that it is possible to access any external object, on any Intranet or on the Internet; thus making the risk exploding, unlashing the different dangers that are present in Internet, for example. with the SubmitForm function we can send predefined labels and data of interactive form fields towards a given URL (e.g. a web server address) as shown in the following chunk of PDF code: << /S /SubmitForm /F << /FS /URL /F (ftp:// >> >> In this example, form data are sent to a website and hidden into a innocent-looking file. the ImportData function enables to import data into the active PDF file (under the Forms Data Format (FDF)). This function thus can be used to steal data from the computer on which a malicious PDF file is opened. Moreover, this function can be misused to conduct Cross Scripting attaks. the JavaScript function enables to execute JavaScript file, through the JavaScript PDF application module, provided that its use complies with the definition of the PDF application library. This function is critical since it is possible to bypass some software security protection before Adobe PDF version 8.0, and of course to execute malicious scripts. As an example, let us consider the following script which just display a message box. 9 0 obj << /Type /OpenAction /S /JavaScript /JS 10 0 R >> endobj 10 0 obj app.alert({cmsg:''hello world'',ctitle:''hello world box''}); endobj
14 It is worth mentioning that in most of the cases a malware will use and combine more than one such critical function. PDF Security Mechanisms Adobe Systems Inc has implemented some security mechanisms in its Applications (Adobe reader and Adobe Acrobat) in order to alert the user in case of some malicious or potentially attempts. These alert measures are most of the time just message box alerts, asking the user to confirm or cancel a given action. Unfortunately, it is possible to bypass these security mechanisms. In order to more deeply forecast the scope and impact of a potential PDF malware, we have analyzed all those security mechanisms up to the latest Adobe Reade 8. Most of the aspects we present hereafter apply to any former version. Without loss of generality, we have conducted this study for the French localized version under Windows. Application-level security: alert message boxes In the C:\ProgramFiles\Adobe\reader8.0\Reader directory, two configuration files are involved in the management of alert message boxes: RdLang32.FRA and AcroRd32.dll. The main weakness comes from the fact that: there is no integrity checking for those files thus allowing modify the alert message in order to fool the user. We could do such modification without triggering any alert; those files are not in read-only access. Thus a malware can modify them very easily, in particular in multi-step attacks. Operating system-level security: configuration file and registry keys This security is enforced directly at the operating system level. This means that any weakly configured system will ease PDF-based attacks. Our analysis has clearly shown that this was the most critical part in the PDF environment security. In order to not disclose technical details that could benefit to bad guys, we will just summarize our results and give some of the most relevant registry keys along with the SUITABLE value they SHOULD take, for an efficient security policy, with respect to PDF malware attacks. This configuration was sufficient to prevent most of our proof-of-concept attacks presented in the next section but it is essential to keep in mind that any malware can modify any registry key. Consequently, frequent control should be an essential part of any security policy. Access to Internet is managed through the registry key givern hereafter. HKU\S \Software\Adobe\ Acrobat Reader\8.0\TrustManager\cDefaultLaunchURLPerms\
15 To block access to any website, the iurlperms subkey must be set to 0x However, it is possible to manage a single website through the thostperms subkey. As a few examples, we have: to authorize access to only, just set the key as follows: HKU\S \Software\Adobe\ Acrobat Reader\8.0\TrustManager\cDefaultLaunchURLPerms\tHostPerms: "version:1 while on the contrary, to deny access to only, just set the key as follows: HKU\S \Software\Adobe\ Acrobat Reader\8.0\TrustManager\cDefaultLaunchURLPerms\tHostPerms: "version:1 Since Adobe Reader version 8, full screen display must be confirmed by the user. Indeed it can be misused to simulate a GUI or an Internet website. However some values for the following registry key (with the suitable value for security enforcement) HKU\S \Software\Adobe\ Acrobat Reader\8.0\FullScreen\iShowDocumentWarning: 0x can cancel the display of any confirmation box and thus launch the full screen display without user s control (and awareness). the use of JavaScript resources directly from a PDF file can be subverted in order to operate actions while bypassing application security local mechanisms. Indeed, JavaScrip maganement in PDF applications is done directly at the registry base level. The registry key HKU\S \Software\Adobe\ Acrobat Reader\8.0\JSPrefs\ is the most critical key with respect to JavaScript security within PDF application. The relevant subkeys with the suitable value for security are JSPrefs\bEnableJS (value 0x ) to forbid Acrobat JavaScript, JSPrefs\bEnableMenuItems (value 0x ) to restrict JavaScript execution priviliges,
16 JSPrefs\bEnableGlobalSecurity (value 0x ) to activate the global security strategy for PDF objects. Adobe applications restrict by default the opening of appended (embedded or attached) documents. But an attacker can modify the following key HKU\S \Software\Adobe\ Acrobat Reader\8.0\Attachments\cUserLaunchAttachmentPerms\ in order to autorize it without control and user s awareness. Two subkeys are thus involved: cattachmenttypetopermlist (no value to forbid access to attached file with a known extension), iunlistedattachmenttypeperm (0x to forbid access to attached file with an unknown extension). Assessing the Risk: two Proof-of-concepts Assessing practically a risk that has been identified theoretically only cannot be done without proof-of-concepts. Convincing decision-makers, modifying a security policy in place are huge, not to say intractable, challenges. Suspicion, intellectual blindness, doubts about the operational scope are all common fences that any IT researcher had to face up at least once in his life. The only scientific approach is to use proof-of-concept validation. Of course, this must be done in a legal and secure way. In particular, this is the only way to identify possible side-effets that would make any theoretical weakness... just a theoretical one, with no real impact on the overall security. On the contrary, successful operational validation can enable to quickly react and prevent the weakness to be exploited by attackers, and incitate the software editor to modify his product. In this section, we are now going to present two successful proof-of-concepts among many others. In order to not disclosed technical data that could be misused in particular the source code of course but also the operational context that makes the attack really successful, we will just present them shortly, from an algorithmic point of view only. Video demos will be presented during the conference. It is essential to mention that antivirus software we have tested, did not raise any alert. PDF-based Phishing Attack This attack basically exploits the strong capabilities of PDF language to accurately and faithfully describe a given document or data. In this respect the full screen mode enables to display to the user a PDF document that perfectly mimick any website. For our attack we have designed a malicious PDF file which fakes the website of a French bank. At the PDF code level, this malicious file has been prepared as follows:
17 The usual login and password fields have been replaced by simple PDF form fields. However, in order to fool the user and mimick the true behaviour of a login page, the password is not displayed when typeset by the user (a sequence of star symbols is just displayed instead). The connection button has been replaced by an interactive widget which in reality launches the client (see the steps of the attacks farther). Then the attack is performed through the following steps: 1. the user opens the PDF file which displays the fake website. Every unsuspicious user will then connect typesetting his login/password to access his bank account; 2. when connecting, the PDF file transparently launches the client and displays a fake seemingly from the bank. This proposes to send a security certificate to the bank for security control purpose; 3. if the user accepts to send this , in fact the transmits a FDF file which contains the user s login/password data, under an encoded, innocent-looking form (in case the PDF code would be analyzed); 4. once this has made this FDF file evade, the malicious PDF file send an URL request to transparently redirect the user towards the legitimate bank website. This simple scenario shows how the confidence in PDF format could be perverted by an attacker in order to mount a phishing attacks. PDF-based Two-step Attack In this attack, the attacker s aim is to fool a privileged user (e.g. a system or network administrator) to make him execute an executable code attached to the PDF file. This latter code will then target both the Adobe Reader application and the Windows operating system. This very simple scenario could be generalized to any k-ary code-based attack (Filiol, 2007). In our case, we have just use a ternary code which is made up of the attack vector which is composed of a malicious PDF file and an attached executable file F 1 ; the payload as another executable file F 2, hidden within the PDF file (which can be in the general case any separate file previously introduced into the target system). In our case, the payload simply displays a Hello World message box but more destructive payloads could be implemented in PDF language (refer to the next section). The attack has then been conducted through the following steps: 1. a malicious, trapped PDF is sent to the privileged user as an attachment of a spoofed . The uses some social engineering tricks in order to incitate the user to activate the F 1 executable;
18 2. once the executable F 1 is launched, it (a) modifies some configuration files of Adobe Reader in a permanent way in order to change the most critical security parameters and manipulate message text of Adobe warning/alert boxes; (b) replicates into any non infected PDF files that are found in the target system; (c) finally launches the payload F 2 either automatic or upon a user s action. File F 1 moreover takes care of managing its action in order to prevent any conflict between the unmodified version of Acrobat Reader and the modified one. This very simple yet powerful attack scheme can be generalized to produce far more sophisticated attacks. Some Other Possible Attacks The sophisticated features and characteristics of PDF language primitives enable to design other powerful attacks. We will just mention some of them that have been addressed in our study and have proved to be potentially very critical: theft of data by picking them up and hidden them into a malicious PDF file, eavesdropping/wiretapping of sensitive data, information warfare against people, malicious actions against the operating system and/or the file system,... Future Work and Conclusion In this paper, we have addressed the security of PDF language primitives with respect to malware attacks. This study has clearly demonstrated that there exist a real risk that must be envisaged very seriously by IT experts. It is likely that our study did not identify all existing risks. However our analysis and results, which have been validated by a few proof-of-concept codes, strongly suggest that PDF security should be envisaged in a more accurate way in operating system management, security policies ans user awareness. In particular, our study urges for some security measures that should be taken to limit the risk of PDF malware. Some of them could be easily implemented at the antivirus software level directly: integrity and access rights should be strengthened in order to forbid the modification of AcroRd32.dll and RdLang32.xxx configuration files (Adobe Systems Inc s level). More generally, any configuration file of a PDF management application should be suitably protected and administrated (read-only access mode);
19 regularly monitor the registry base in order to check that PDF application related key are suitably configured; we are currently developing a free tool to perform security check on demand, PDF file must not be open while logged as root or as a privileged user; monitor any suspect or unusual aspect/behaviour of PDF management applications, preferably use PDF with no (too much) active/critical content, unless strictly necessary; systematically use digital signature to exchange PDF document. We now intend to explore further the risk attached to PDF language, in particular firstly with respect to the Unices environments in which the security at the operating system level seems to be less permissive and second with respect to Adobe Reader 8 whose features and primitives have been significantly increased for more document accessibility. PDF evolution towards more and more ergonomy a new version is published every two years asks for a permanent and deep security analysis of the PDF language power.
20 References Adobe Inc (2003). Adobe Acrobat Security, Accessibility and Forms Patch. Adobe Systems Inc. (2004). PDF Reference Version 1.6. Fifth Edition. adobe.com/support/ Blonce, A., Filiol, E. and Frayssignes, L. (2007). Evaluation SSI des risques inhérents au format PDF et réalisation de codes proof of concept. Virology and Cryptology Lab Technical Report. CERT (2000). Filiol, A. (2007). Formalisation and Implementation Aspects of K-ary (malicious) Codes. EICAR 2007 Special Issue, V. Broucek ed., Journal in Computer Virology, 3 (2). Laurio, J.-M. (2007). Universal XSS with PDF Files: highly dangerous. Shezaf, O. (2003). The Universal XSS PDF Vulnerability. Vulnerability.pdf Trend Micro (2000). Peachy Virus Analysis. VName=VBS_PEACHYPDF.A
RIA SECURITY TECHNOLOGY
RIA SECURITY TECHNOLOGY Ulysses Wang Security Researcher, Websense Hermes Li Security Researcher, Websense 2009 Websense, Inc. All rights reserved. Agenda RIA Introduction Flash Security Attack Vectors
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Cross-Site Scripting
Cross-Site Scripting (XSS) Computer and Network Security Seminar Fabrice Bodmer ([email protected]) UNIFR - Winter Semester 2006-2007 XSS: Table of contents What is Cross-Site Scripting (XSS)? Some
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
Office Documents: New Weapons of Cyberwarfare
Office Documents: New Weapons of Cyberwarfare Jonathan Dechaux [email protected], Eric Filiol [email protected], Jean-Paul Fizaine [email protected] Ecole Supérieure en Informatique, Electronique
The evolution of virtual endpoint security. Comparing vsentry with traditional endpoint virtualization security solutions
The evolution of virtual endpoint security Comparing vsentry with traditional endpoint virtualization security solutions Executive Summary First generation endpoint virtualization based security solutions
E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications
Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows Products Details ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity
Operation Liberpy : Keyloggers and information theft in Latin America
Operation Liberpy : Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab 7/7/2015 version 1.1 Contents Introduction... 3 Operation
Phishing by data URI
Phishing by data URI Henning Klevjer [email protected] October 22, 2012 1 Abstract Historically, phishing web pages have been hosted by web servers that are either compromised or owned by the attacker.
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Banking Security using Honeypot
Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai [email protected] Abstract New threats are constantly emerging to the security of organization s information
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
INSTANT MESSAGING SECURITY
INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks Whitepaper The security industry has extensively focused on protecting against malicious injection attacks like
Liquid Machines Document Control Client Version 7. Helpdesk Run Book and Troubleshooting Guide
Document Control Client Version 7 OVERVIEW OF LIQUID MACHINES DOCUMENT CONTROL VERSION 7...1 FEATURES...1 Microsoft Windows Rights Management Services (RMS)...1 Policies and Rights...1 Client...1 Policy
What do a banking Trojan, Chrome and a government mail server have in common? Analysis of a piece of Brazilian malware
What do a banking Trojan, Chrome and a government mail server have in common? Analysis of a piece of Brazilian malware Contents Introduction.................................2 Installation: Social engineering
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. [email protected]
INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library [email protected] Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup
Common Cyber Threats. Common cyber threats include:
Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.
CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Best Practices for Deploying Behavior Monitoring and Device Control
Best Practices for Deploying Behavior Monitoring and Device Control 1 Contents Overview... 3 Behavior Monitoring Overview... 3 Malware Behavior Blocking... 3 Event Monitoring... 4 Enabling Behavior Monitoring...
CORPORATE AV / EPP COMPARATIVE ANALYSIS
CORPORATE AV / EPP COMPARATIVE ANALYSIS Exploit Evasion Defenses 2013 Randy Abrams, Dipti Ghimire, Joshua Smith Tested Vendors AVG, ESET, F- Secure, Kaspersky, McAfee, Microsoft, Norman, Panda, Sophos,
SECURITY TRENDS & VULNERABILITIES REVIEW 2015
SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall
PDF Forms Advantages and application possibilities of electronic forms in PDF format
White Paper PDF Forms Advantages and application possibilities of electronic forms in PDF format Copyright 2002-2009 soft Xpansion GmbH & Co. KG White Paper PDF Forms 1 Table of Contents Usage of Forms...
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
Sitefinity Security and Best Practices
Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management
ITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Intrusion Defense Firewall
Intrusion Defense Firewall Available as a Plug-In for OfficeScan 8 Network-Level HIPS at the Endpoint A Trend Micro White Paper October 2008 I. EXECUTIVE SUMMARY Mobile computers that connect directly
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? Drive-by Downloads are a common technique used by attackers to silently install malware on a victim s computer. Once a target website has been weaponized with
Advanced Endpoint Protection Overview
Advanced Endpoint Protection Overview Advanced Endpoint Protection is a solution that prevents Advanced Persistent Threats (APTs) and Zero-Day attacks and enables protection of your endpoints by blocking
Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems
IT 4823 Information Security Administration Securing Operating Systems June 18 Security Maintenance Practices Basic proactive security can prevent many problems Maintenance involves creating a strategy
Tracking Anti-Malware Protection 2015
Tracking Anti-Malware Protection 2015 A TIME-TO-PROTECT ANTI-MALWARE COMPARISON TEST Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to measure
How to Use Windows Firewall With User Account Control (UAC)
Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure
PROTECT YOUR COMPUTER AND YOUR PRIVACY!
PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That
Installation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Forwarded-For support to Forward and Reverse Proxy TMG Servers Published: May 2010 Applies to: Winfrasoft X-Forwarded-For
When you listen to the news, you hear about many different forms of computer infection(s). The most common are:
Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
Recurrent Patterns Detection Technology. White Paper
SeCure your Network Recurrent Patterns Detection Technology White Paper January, 2007 Powered by RPD Technology Network Based Protection against Email-Borne Threats Spam, Phishing and email-borne Malware
Web Application Security
Web Application Security Ng Wee Kai Senior Security Consultant PulseSecure Pte Ltd About PulseSecure IT Security Consulting Company Part of Consortium in IDA (T) 606 Term Tender Cover most of the IT Security
Malicious Software. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49. Viruses and Related Threats
Malicious Software Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Outline Viruses and Related Threats Malicious Programs The Nature of Viruses Antivirus
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL Ensuring Compliance for PCI DSS 6.5 and 6.6 CONTENTS 04 04 06 08 11 12 13 Overview Payment Card Industry Data Security Standard PCI Compliance for Web Applications
Computer Security DD2395
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh11/ Fall 2011 Sonja Buchegger [email protected] Lecture 7 Malicious Software DD2395 Sonja Buchegger 1 Course Admin Lab 2: - prepare
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
Security features of ZK Framework
1 Security features of ZK Framework This document provides a brief overview of security concerns related to JavaScript powered enterprise web application in general and how ZK built-in features secures
UNCLASSIFIED Version 1.0 May 2012
Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice
Aras Corporation. 2005 Aras Corporation. All rights reserved. Notice of Rights. Notice of Liability
Aras Corporation 2005 Aras Corporation. All rights reserved Notice of Rights All rights reserved. Aras Corporation (Aras) owns this document. No part of this document may be reproduced or transmitted in
PCI Data Security Standards (DSS)
ENTERPRISE APPLICATION WHITELISTING SOLUTION Achieving PCI Compliance at the Point of Sale Using Bit9 Parity TM to Protect Cardholder Data PCI: Protecting Cardholder Data As the technology used by merchants
Information Security for Modern Enterprises
Information Security for Modern Enterprises Kamal Jyoti 1. Abstract Many enterprises are using Enterprise Content Management (ECM) systems, in order to manage sensitive information related to the organization.
The Hidden Dangers of Public WiFi
WHITEPAPER: OCTOBER 2014 The Hidden Dangers of Public WiFi 2 EXECUTIVE SUMMARY 4 MARKET DYNAMICS 4 The Promise of Public WiFi 5 The Problem with Public WiFi 6 MARKET BEHAVIOR 6 Most People Do Not Protect
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Anti-exploit tools: The next wave of enterprise security
Anti-exploit tools: The next wave of enterprise security Intro From malware and ransomware to increasingly common state-sponsored attacks, organizations across industries are struggling to stay ahead of
Xcalibur. Foundation. Administrator Guide. Software Version 3.0
Xcalibur Foundation Administrator Guide Software Version 3.0 XCALI-97520 Revision A May 2013 2013 Thermo Fisher Scientific Inc. All rights reserved. LCquan, Watson LIMS, and Web Access are trademarks,
LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages
LASTLINE WHITEPAPER Large-Scale Detection of Malicious Web Pages Abstract Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and,
Sandy. The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis. Garage4Hackers
Sandy The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis About Me! I work as a Researcher for a Global Threat Research firm.! Spoke at the few security
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Internet Explorer turns your personal computer into a publicfile Server
Internet Explorer turns your personal computer into a publicfile Server Black Hat DC 2010 Jorge Luis Alvarez Medina 1 Jorge Luis Alvarez Medina CORE Security Technologies February 2010 Outline Attack results
Firewalls and Software Updates
Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General
WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6
WHITE PAPER FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6 Ensuring compliance for PCI DSS 6.5 and 6.6 Page 2 Overview Web applications and the elements surrounding them
Guidance Regarding Skype and Other P2P VoIP Solutions
Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,
TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY. Mark Villinski @markvillinski
TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY Mark Villinski @markvillinski Why do we have to educate employees about cybersecurity? 2014 Corporate Threats Survey 94% of business s suffered one
Cross Site Scripting Prevention
Project Report CS 649 : Network Security Cross Site Scripting Prevention Under Guidance of Prof. Bernard Menezes Submitted By Neelamadhav (09305045) Raju Chinthala (09305056) Kiran Akipogu (09305074) Vijaya
Secure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.
Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person
KASPERSKY FRAUD PREVENTION FOR ENDPOINTS
KASPERSKY FRAUD PREVENTION FOR ENDPOINTS www.kaspersky.com 2 Fraud Prevention for Endpoints KASPERSKY FRAUD PREVENTION 1. Ways of Attacking The prime motive behind cybercrime is making money, and today
IBM Security re-defines enterprise endpoint protection against advanced malware
IBM Security re-defines enterprise endpoint protection against advanced malware Break the cyber attack chain to stop advanced persistent threats and targeted attacks Highlights IBM Security Trusteer Apex
Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities?
ANALYST BRIEF Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities? Author Randy Abrams Tested Products Avast Internet Security 7 AVG Internet Security 2012 Avira Internet Security
Spyware Doctor Enterprise Technical Data Sheet
Spyware Doctor Enterprise Technical Data Sheet The Best of Breed Anti-Spyware Solution for Businesses Spyware Doctor Enterprise builds on the strength of the industry-leading and multi award-winning Spyware
InfoView User s Guide. BusinessObjects Enterprise XI Release 2
BusinessObjects Enterprise XI Release 2 InfoView User s Guide BusinessObjects Enterprise XI Release 2 Patents Trademarks Copyright Third-party contributors Business Objects owns the following U.S. patents,
Web Application Security
E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary
Scheduling Software User s Guide
Scheduling Software User s Guide Revision 1.12 Copyright notice VisualTime is a trademark of Visualtime Corporation. Microsoft Outlook, Active Directory, SQL Server and Exchange are trademarks of Microsoft
(Self-Study) Identify How to Protect Your Network Against Viruses
SECTION 24 (Self-Study) Identify How to Protect Your Network Against Viruses The following objective will be tested: Describe What You Can Do to Prevent a Virus Attack In this section you learn about viruses
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
Web Security School Final Exam
Web Security School Final Exam By Michael Cobb 1.) Which of the following services is not required to run a Windows server solely configured to run IIS and publish a Web site on the Internet? a. IIS Admin
White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management
White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES By James Christiansen, VP, Information Risk Management Executive Summary Security breaches in the retail sector are becoming more
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework [email protected] keralacyberforce.in Introduction Cross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s.
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
Five Tips to Reduce Risk From Modern Web Threats
Five Tips to Reduce Risk From Modern Web Threats By Chris McCormack, Senior Product Marketing Manager and Chester Wisniewski, Senior Security Advisor Modern web threats can infect your network, subvert
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
Novell ZENworks 10 Configuration Management SP3
AUTHORIZED DOCUMENTATION Software Distribution Reference Novell ZENworks 10 Configuration Management SP3 10.3 November 17, 2011 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties
