[Owasp-manila] Encoding malicious PDFs as XDP files to bypass anti-virus? No need to panic | Naked Security

Aureson Banaria tom at secanalyst.org
Mon Jun 25 04:26:34 UTC 2012


Will try it using my own crafted infected pdf file...



On Sun, Jun 24, 2012 at 7:14 PM, Owasp-Manila <michael.dungog at owasp.org>wrote:

> GovCertUK, the UK Government's Computer Emergency Response Team, issued an
> alert yesterday about how attackers could bypass gateway anti-virus
> software to infect organisations, by encoding malicious PDF files into the
> XDP format.
>
>
> http://nakedsecurity.sophos.com/2012/06/22/encoding-malicious-pdfs-as-xdp-files-to-bypass-anti-virus-no-need-to-panic/
>
> Sent from Feeddler RSS Reader
>
> _______________________________________________
> Owasp-manila mailing list
> Owasp-manila at lists.owasp.org
> https://lists.owasp.org/mailman/listinfo/owasp-manila
>
>


-- 

Aureson B. Banaria

Security Analyst | Opensource advocate

Security Operations Center

PerimeterUSA e-security Manila HQ


email at aureson_01@yahoo.com.ph, / abanaria at perimeterusa.com
<aureson_01 at yahoo.com.ph>

4/F SM CyberOne, 69 Jupiter St. Buendia Makati City Philippines

Mobile# 0922.590.1921
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.owasp.org/pipermail/owasp-manila/attachments/20120624/393f6dd5/attachment.html>


More information about the Owasp-manila mailing list