Stack Overflow for Teams — Collaborate and share knowledge with a private group. Create a free Team What is Teams? Learn more. How to safely view a malicious PDF? Ask Question. Asked 9 years, 3 months ago. Active 3 years, 4 months ago. Viewed 71k times. Improve this question.
Anders Is it of a JS kind? I think you can turn off JS. The thing I would do is open it in a virtual machine without network access. There may be a question here as to whether static or dynamic analysis is most effective. If a PDF contains malicious software then it no longer should be viewed. Besides non-malicious content likely doesn't even exist. You could also open the PDF file in a Linux virtual machine, but like I said, the content is likely gone.
I don't know this. Show 1 more comment. Active Oldest Votes. Improve this answer. Mike Samuel 3, 17 17 silver badges 25 25 bronze badges. The main vulnerability in adobe which I don't use is using javascript to call on an insecure undocumented API it run shellcode. I used origami to decrypt and decomporess and pdfid to check if it has javascript triggers which it doesn't I don't use foxit or adobe. I use an obscure reader.
Recently, it crashed when i opened a pdf file. Can this be a malware attack? How do I check? Note about the edit - most modern Linux systems have several native PDF viewers available including a ancient version of Adobe Reader, usually you don;t need to bother with that - I suggest using Okular, and most versions of evince and mupdf work great as well , you don't need to use a Windows VM FirstNameLastName be weary of using lesser known products to avoid infection.
Hardened VM really is the only way to be sure. Add a comment. B-Con B-Con 1, 12 12 silver badges 19 19 bronze badges.
I don't want to give the information in the PDF to google but thanks. Using Google Docs is good advice, but "Put it through a PDF viewer that isn't vulnerable to the exploit" sounds strange to my ears. Usually, you don't know whether a particular viewer is vulnerable until it's too late.
DmitryGrigoryev if the exploit depends on javascript as almost all of them do, then a viewer that does not support javascript makes that exploit impossible.
An exploit that depends on file attachments is rendered impossible by a viewer that doesn't support attachments. An exploit that depends on retrieving data from a URL cannot work if the viewer does not support retrieving data from a URL.
And so forth. DmitryGrigoryev I'm not sure what your point is. An exploit specifically targeted to work with Sumatra is possible, as I stated in my answer.
Its likelihood is exceedingly small. No such method exists. Some browsers open PDF files without downloading them. If you cannot see the Disk icon, look for a Download option instead.
Once the file is downloaded, a save option should appear. If the PDF file is already open in the reader program or, a PDF form is filled out, you can save it using the program. For example, in Adobe Reader, a computer diskette icon is available in the toolbar located near the top of the program window.
Adobe reader is free software that can easily be accessed and downloaded online. However, the additional capabilities are not free and if you need them, you have to pay for them.
For the windows operating systems, different windows versions exist. The settings vary slightly in each version.
The steps given therefore represent how you can set Adobe Reader as a default in Windows Various differences arise between Adobe Acrobat and Adobe Reader. For instance, Adobe Reader is free and can be downloaded online while Adobe Acrobat Standard is not free and one has to purchase it.
Another comparison can be seen on the functions. Adobe Reader on the other hand cannot create PDFs but it can open them.
Additional tools such as typewriter make it easier to fill forms that would otherwise be unusable. However, Adobe Reader has limited features and Acrobat is too expensive, you can choose a better solution - PDFelement.
Buy PDFelement right now!
0コメント