all InfoSec news
Extract a /FlateDecode XObject filter (image) from a PDF stream with pdf-parser
March 27, 2023, 3:18 p.m. | /u/ringzero_
Malware Analysis & Reports www.reddit.com
So I know that you can extract stream objects containing jpg images using /DCTDecode by simply running:
> pdf-parser.py bad.pdf -o (object number) -d (filename)
and then using feh to view the extracted image. However, a lot of PDFs I am coming across lately have objects containing images with /FlateDecode as the filter. If I try the above pdf-parser extract command, I get "No Imlib2 loader for that file format"
Running file on the …
bad coming command extract filename filter hey hope images jpg loader malware object pdf pdfs stream zlib
More from www.reddit.com / Malware Analysis & Reports
List of ransomware groups and their PR pages (2024)
1 day, 7 hours ago |
www.reddit.com
Detecting Banker Malware Installed on Android Devices
2 days, 17 hours ago |
www.reddit.com
Malware analysis of an open-source project
4 days, 16 hours ago |
www.reddit.com
How to Emulate a Ransomware Attack
1 week, 2 days ago |
www.reddit.com
Five Unpacking Methods and a Generic Unpacking Approach
1 week, 5 days ago |
www.reddit.com
[Blog] RisePro stealer targets Github users in "gitgub" campaign
2 weeks, 1 day ago |
www.reddit.com
Jobs in InfoSec / Cybersecurity
Information Technology Specialist II: Network Architect
@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, CA
Cybersecurity Skills Challenge -- Sponsored by DoD
@ Correlation One | United States
Security Operations Center (SOC) Analyst
@ GK Cybersecurity Group | Remote
Cyber Consultant
@ Frazer-Nash Consultancy | Gloucester, England, United Kingdom
Senior Vulnerability Management Reporting & Analytics Developer
@ Baker Hughes | IN-KA-BANGALORE-NEON BUILDING WEST TOWER
Product Security Architect
@ ChargePoint | Italy