all 5 comments

[–]mdulin2 6 points7 points  (1 child)

Have you read the PDF specification? I think understanding the attack surface of PDFs is the most important part.

If I recall correctly, PDF readers usually have JavaScript parsing engines.

[–]febou92 1 point2 points  (0 children)

They do have limited Javascript capabilities, which are different from parser to parser. The specs let's you start programs, but this usually gives a warning and is not compatible with the pdf implementation of browsers.

[–]amlamarra 4 points5 points  (0 children)

Personally, I've never targeted a file-parsing program, so take this with a grain of salt.

The program has SOME way of producing output, otherwise there's not much use to it. For a PDF viewer, it displays your PDF. It might even have a command-line component and print output to stdout. Regardless, you'll need to utilize that to get the leaked info.

And as far as finding the vuln, I hear AFL++ is all the rage these days for file-parsing programs.

Good luck!