Completed
Attacker Model
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Practical Decryption Exfiltration: Breaking PDF Encryption
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 PDFex
- 3 Overview
- 4 Portable Document Format
- 5 Who uses PDF Encryption?
- 6 Attacker Model
- 7 PDF Encryption in a Nutshell
- 8 Gaps in PDF Encryption
- 9 Simple Content Overlay
- 10 Direct Exfiltration through PDF Forms
- 11 Direct Exfiltration via Hyperlinks
- 12 Direct Exfiltration with JavaScript
- 13 Malleability Gadgets
- 14 Prerequisites
- 15 Known Plaintext
- 16 Gadget Attacks
- 17 PDF Signatures
- 18 Closing Backchannels
- 19 Short Term Mitigation
- 20 Conclusion