Anyone want to challenge it? On Mon, Nov 1, 2010 at 12:15 PM, [email protected] < [email protected]> wrote:
> Another challenge is ready to be tackled by forensic analysts, students, > hackers and alike. This time, we present you with an attack vector that has > become quite successful: malicious PDF files! > > For challenge 6 <https://www.honeynet.org/challenges/2010_6_malicious_pdf> of > our series (provided by Mahmud Ab Rahman and Ahmad Azizan Idris from the > Malaysia Honeynet Project Chapter) we present you with a pcap file that > contains network traffic generated by the following scenario: An > unsuspecting user opens a compromised web page, which redirects the user's > web browser to a URL of a malicious PDF file. As the PDF plug-in of the > browser opens the PDF, the unpatched version of Adobe Acrobat Reader is > exploited and, as a result, downloads and silently installs malware on the > user's machine. > > We prepared a set of questions that requires you to dive deep into the > portable document format. Submit your solution by November 30th 2010. The > top three submissions will receive small prizes. > > Enjoy! > > Christian Seifert > Chief Communications Officer > The Honeynet Project > > -- > You received this message because you are subscribed to the Google Groups > "MySecurity" group. > To post to this group, send email to [email protected]. > To unsubscribe from this group, send email to > [email protected]<mysecurity%[email protected]> > . > For more options, visit this group at > http://groups.google.com/group/mysecurity?hl=en. >
_______________________________________________ Owasp-Malaysia mailing list [email protected] https://lists.owasp.org/mailman/listinfo/owasp-malaysia OWASP Malaysia Wiki http://www.owasp.org/index.php/Malaysia OWASP Malaysia Wiki Facebook http://www.facebook.com/pages/OWASP-Malaysia-Local-Chapter/295989208420

