PDF Forensic with MPeePDF
This documentations goal is to illustrate the use of the tool MPeePDF which can be used to do PDF forensic work. The goal of PDF forensic is to analyse documents and determine if a malicious activity is conducted.
- Operating system: Ubuntu 20.04
- Packages: git, python2
In order to complete these steps, you must have followed python2 install guide before.
Enter these commands in the shell to start an analysis of a document.
python2 mpeepdf.py [your.pdf]
This will scan the document and output general information about the document and their contents. You can also go into the console to execute further commands. Just add the -i parameter.
python2 mpeepdf.py -i [your.pdf]
While inside the console, you can look up more things like metadata, specific information about streams and objects and much more. To see all available command type in help into the console.
Inside the console are many options to analyse your document. You can start by looking at the metadata of the file by typing in:
If you want to look at specific objects or stream type in:
object  stream 
The raw data of the respective object/stream can also be seen with:
rawobject  rawstream 
You can also store a object or stream in an variable with following command:
object  $> var1
An export to a file is also possible with:
object  > object1.txt