Difference between revisions of "PDF Forensic with MPeePDF"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
Line 22: Line 22:
   python2 mpeepdf.py -i [your.pdf]
   python2 mpeepdf.py -i [your.pdf]


[[File:Pdfanalysis.png|700px|thumb|center|alt text]]
[[File:Pdfanalysis.png|700px|thumb|center|Result of an Analysis]]


=== Step 2 ===
=== Step 2 ===
While inside the console, you can lookup more things like metadata, specific information about streams and objects and much more. To see all available command type in help into the console.
While inside the console, you can look up more things like metadata, specific information about streams and objects and much more. To see all available command type in help into the console.


[[File:pdfhelp.png|700px|thumb|center|All Options available]]
[[File:pdfhelp.png|700px|thumb|center|All Options available]]
Line 34: Line 34:
   metadata
   metadata


[[File:Pdfmetadata.png|700px|thumb|center|alt text]]
[[File:Pdfmetadata.png|700px|thumb|center|Metadata of a PDF Document]]


If you want to look at specific objects or stream typ in:
If you want to look at specific objects or stream type in:


   object [1]
   object [1]
   stream [1]
   stream [1]


[[File:Pdfobject.png|700px|thumb|center|alt text]]
[[File:Pdfobject.png|700px|thumb|center|A object]]




Line 51: Line 51:




[[File:Pdfrawobject.png|700px|thumb|center|alt text]]
[[File:Pdfrawobject.png|700px|thumb|center|A raw object]]




[[File:Pdfrawstream.png|700px|thumb|center|alt text]]
[[File:Pdfrawstream.png|700px|thumb|center|A raw stream]]




Line 64: Line 64:
   object [1] $> var1
   object [1] $> var1


[[File:Pdfobjectvariable.png|700px|thumb|center|alt text]]
[[File:Pdfobjectvariable.png|700px|thumb|center|An object stored in a variable]]


An export to a file is also possible with:
An export to a file is also possible with:
Line 70: Line 70:
   object [1] > object1.txt
   object [1] > object1.txt


[[File:Pdfobjectfile.png|700px|thumb|center|alt text]]
[[File:Pdfobjectfile.png|700px|thumb|center|An object saved to a text file]]


== Used Hardware ==
== Used Hardware ==

Revision as of 12:22, 20 December 2021

Summary

This documentations goal is to illustrate the use of the tool MPeePDF which can be used to do PDF forensic work. The goal of PDF forensic is to analyse documents and determine if a malicious activity is conducted.

Requirements

  • Operating system: Ubuntu 20.04
  • Packages: git, python2

In order to complete these steps, you must have followed python2 install guide before.

Description

Step 1

Enter these commands in the shell to start an analysis of a document.

python2 mpeepdf.py [your.pdf]

This will scan the document and output general information about the document and their contents. You can also go into the console to execute further commands. Just add the -i parameter.

 python2 mpeepdf.py -i [your.pdf]
Result of an Analysis

Step 2

While inside the console, you can look up more things like metadata, specific information about streams and objects and much more. To see all available command type in help into the console.

All Options available

Step 3

Inside the console are many options to analyse your document. You can start by looking at the metadata of the file by typing in:

 metadata
Metadata of a PDF Document

If you want to look at specific objects or stream type in:

 object [1]
 stream [1]
A object


The raw data of the respective object/stream can also be seen with:

 rawobject [1]
 rawstream [1]


A raw object


A raw stream



You can also store a object or stream in an variable with following command:

 object [1] $> var1
An object stored in a variable

An export to a file is also possible with:

 object [1] > object1.txt
An object saved to a text file

Used Hardware

Device to be used with this documentation Maybe another device to be used with this documentation

Courses

References