![]() Okay, here's the scenario of this attack method :ġ. If you watching or reading news a few weeks ago about Australia parliament computer has compromised by unknown hacker, actually the hacker do some social engineering technique to gain a privilege to Australian parliament computer and it was almost the same method use in this tutorial. Almost 95%(maybe) Windows users have Adobe Acrobat (Acrobat Reader) application in their computer or laptops. In this tutorial I will give a demonstration how to attack client side using Adobe PDF Escape EXE vulnerability. ![]() I didn't say it was WRONG, because in fact yes it was the weakest, but I also cannot say TRUE, because sometimes the human didn't know what they are doing because no one told them before □. ![]() There are some people says that the weakest security to breach was the human itself. Vulnerable Application Testing : Adobe Reader 9.1
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |