[Owasp-Malaysia] [MySEC] Forensic Challenge 2010/6 - Analyzing Malicious Portable Destructive Files is now live
Mohd Fazli Azran
mfazliazran at gmail.com
Thu Nov 4 02:19:01 EDT 2010
Anyone want to challenge it?
On Mon, Nov 1, 2010 at 12:15 PM, najmi.zabidi at gmail.com <
najmi.zabidi at gmail.com> wrote:
> Another challenge is ready to be tackled by forensic analysts, students,
> hackers and alike. This time, we present you with an attack vector that has
> become quite successful: malicious PDF files!
> For challenge 6 <https://www.honeynet.org/challenges/2010_6_malicious_pdf> of
> our series (provided by Mahmud Ab Rahman and Ahmad Azizan Idris from the
> Malaysia Honeynet Project Chapter) we present you with a pcap file that
> contains network traffic generated by the following scenario: An
> unsuspecting user opens a compromised web page, which redirects the user's
> web browser to a URL of a malicious PDF file. As the PDF plug-in of the
> browser opens the PDF, the unpatched version of Adobe Acrobat Reader is
> exploited and, as a result, downloads and silently installs malware on the
> user's machine.
> We prepared a set of questions that requires you to dive deep into the
> portable document format. Submit your solution by November 30th 2010. The
> top three submissions will receive small prizes.
> Christian Seifert
> Chief Communications Officer
> The Honeynet Project
> You received this message because you are subscribed to the Google Groups
> "MySecurity" group.
> To post to this group, send email to mysecurity at googlegroups.com.
> To unsubscribe from this group, send email to
> mysecurity+unsubscribe at googlegroups.com<mysecurity%2Bunsubscribe at googlegroups.com>
> For more options, visit this group at
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Owasp-Malaysia