The document discusses various client-side exploits that can be carried out using PDF files. It describes how launch actions, AcroJS (Adobe JavaScript), and embedded executables can be used to exploit vulnerabilities in PDF readers. Specific vulnerabilities and a proof-of-concept example using a hex-encoded executable embedded in comments are presented. The document also covers obfuscation techniques used to evade detection, such as modifying the PDF format and using JavaScript obfuscation.
Related topics: