Navigation
Subscribe to our Newsletter!
Our Newsletter is primarily directed to users of the Profiler who want to learn more about the product, use cases, discover tips & tricks, be kept up-to-date with future improvements and participate to polls.-
Recent Posts
Recent Comments
- Daniel Pistelli on Microsoft Office DDE Detection
- Jim on Microsoft Office DDE Detection
- Daniel Pistelli on Profiler 2.8 – Windows Memory Forensics
- Victor Peskariu on Profiler 2.8 – Windows Memory Forensics
- Daniel Pistelli on JBIG2 Encoded Malware in PDFs
Archives
- April 2018
- March 2018
- January 2018
- November 2017
- March 2017
- July 2016
- May 2016
- April 2016
- October 2015
- September 2015
- June 2015
- December 2014
- October 2014
- September 2014
- August 2014
- July 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- January 2013
- December 2012
- November 2012
- October 2012
- September 2012
- August 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- November 2011
- August 2011
Tags
Actions Android Binary bomb bytecode C cfbf Clang Classes Dalvik Decryption Elf Email Embedded OpenType EML Filters Fonts GCC html Java Mac Mac OS X Malware MSIL News OLE OpenType OS X PDF PE Portable Executable Preview Profiler Python SDK Search Shellcode Structs Structures Type1 UI VC Visual C++ xml ZipCategories
- Action
- Action
- Action
- Advanced
- AXML
- CFBF
- CFont
- Class
- Data
- Demo
- DEX
- ELF
- EOT
- Filters
- Fonts
- Forensics
- Format
- Headers
- Hooks
- ITSF
- JavaScript
- JPEG
- Layouts
- Logic Providers
- MachO
- Memory
- OTF
- PDB
- PE
- PE Insider
- Profiler
- Profiler Advanced
- PySide
- Python
- Report
- RTF
- SDK
- Security
- SQLite3
- SWF
- Type1
- Uncategorized
- Use case
- Video
- WinLnk
- WOFF
- Zip
Tag Archives: Overflow
CVE-2010-0188: PDF/Form/TIFF
Given the good reception of the last post, I’ve decided to dedicate more time posting use cases for the Profiler. Today we’re going to analyze a PDF exploiting CVE-2010-0188. Quite old as the name can tell, but it doesn’t really … Continue reading