
In the next step, we need to decrypt it via hex decoder. Everything is good with the code, but the numbers and letters seems to be HEX. In actuality, it is the root cause but how can this be confirmed.
Malicious pdf attributes code#
Let’s decode it by using the java decoding function and the result is:Īgain, it seems to be a legitimate piece of code because the attacker has created it very carefully and used the term “GPL” “wp” and “Java” so the code seems to be legitimate. It seems to be normal and an important code for this website but in reality, it is the root cause of the problem. Now, there is no URL of the third party website so what is the problem? Sometimes attackers use human weaknesses (social engineering technique) in a web application attack. Let’s suppose you have reviewed but have not found any URL of the third party website. A simple way is to review the index page for the possible iframe and redirect code. The visitor of this website trusts your website, and they usually purchase products so you need to make sure to clean the website from this tricky attack. Let’s consider an example- A website has been compromised and it redirects or displays another web page within a page to sell some products. However, in an obfuscated iframe injection attack, it is not easy to read the injected code. If a website has been compromised by using iframe injection attack, then it is easy to find and locate the injection code because the code is easy to read. The aim of this attack is the same- to trick the user and then redirect to the third party web page to exploit the user. Obfuscated is the way to hide the meaning of the communication so that it is difficult to find the injected code. Obfuscated iframe injection attack is a dangerous and tricky attack because it is very difficult to detect and find the malicious injection code on a website. Here I put Infosec Institute’s website URL, but an attacker can insert the URL of some malware and spamming website. Now it is completely hidden from the user’s eye, but the iframe is working as normal. This technique is not used by the attacker because the frame occupies the area (width and height). Width and height of an iframe has been defined, but since the frame visibility is hidden there is no physical presence of Infosec Institute’s website.
Malicious pdf attributes how to#
The above picture shows how to display another website within a website. The simple attribute to use iframe is as follows: Security risk in iframe is an important topic to discuss because the usage of iframe is very common- even the most famous social networking websites are using iframe. The simple way to explain iframe is that “iframe is the technique to display the information from another web page within the same (current) page”.

In this article, we will discuss the attack at HTML level or attack at HTML codes, iframe is the part of HTML or a technique used in HTML to embed some file (document, video and others) in the same HTML page. This can break the trust of the visitor on your website. SQL-injection is dangerous because an attacker may get access into a database and steal the information of the user and the administrator of the website, but what if an attacker simply hijacks the user or simply redirects your visitor to a malicious website.
Malicious pdf attributes manual#
There are so many automatic tools and manual techniques available to test a website for the most common vulnerabilities, like SQL injection, cross site scripting, security misconfiguration and others, but we should take care about the variant of these vulnerabilities. Hackers are always trying to discover new ways to trick a user so from a penetration tester’s point of view a website administrator should take care of each and every vulnerability and the weaknesses that an attacker may exploit to hack into a website. OWASP has created an outline to secure a web application from the most dangerous vulnerabilities in web application, but it is always good to be actively learning about the new weaknesses and the new ways that an attacker might use to hack into a web application. Hackers use websites to spread their malwares and worms, and they use the compromised websites for spamming and other purposes. Web application security is always an important topic to discuss because websites seem to be the first target of malicious hackers.
