20 October 2009 | 24,528 views

Origami – Parse, Analyze & Forge PDF Documents

Prevent Network Security Leaks with Acunetix

origami is a Ruby framework designed to parse, analyze, and forge PDF documents. This is NOT a PDF rendering library. It aims at providing a scripting tool to generate and analyze malicious PDF files. As well, it can be used to create on-the-fly customized PDFs, or to inject (evil) code into already existing documents.

Features

  • Create PDF documents from scratch.
  • Parse existing documents, modify them and recompile them.
  • Explore documents at the object level, going deep into the document structure, uncompressing PDF object streams and desobfuscating names and strings.
  • High-level operations, such as encryption/decryption, signature, file attachments…
  • A GTK interface to quickly browse into the document contents.

Full Scripts

Some scripts are provided to help in performing common actions on PDF files. You can contribute more by sending your own scripts to origami(at)security-labs.org.

  • detectjs.rb: search for all JavaScript objects.
  • embed.rb: add an attachment to a PDF file.
  • create-jspdf.rb: add a JavaScript to a PDF file, executed when the document is opened.
  • moebius.rb: transform a PDF to a moebius strip.
  • encrypt.rb: encrypt a PDF file.

You can download Origami here:

origami-1.0.0-beta1.tar.gz

Or read more here.



Recent in Forensics:
- HoneyDrive 3 Released – The Premier Honeypot Bundle Distro
- Sysdig – Linux System Troubleshooting Tool
- HoneyDrive Desktop v0.2 Released – Honeypot LiveCD

Related Posts:
- peepdf – Analyze & Modify PDF Files
- ParanoiDF – PDF Analysis & Password Cracking Tool
- w3af – Web Application Attack and Audit Framework

Most Read in Forensics:
- NetworkMiner – Passive Sniffer & Packet Analysis Tool for Windows - 65,703 views
- raw2vmdk – Mount Raw Hard Disk (dd) Images As VMDK Virtual Disks - 29,964 views
- sslsniff v0.6 Released – SSL MITM Tool - 26,915 views

Low-cost VPS Hosting

7 Responses to “Origami – Parse, Analyze & Forge PDF Documents”

  1. anonymous 20 October 2009 at 3:00 pm Permalink

    clamav reports this containts a virus.

    http://www.virustotal.com/analisis/03d625dd6742e83e1cf1e7aada8ac8204c837386922d724032600a741c8dd32d-1256051167

  2. Sebastian Haensch 20 October 2009 at 3:18 pm Permalink

    Panda reports Eicar.Mod thats funny…

    EICAR: http://en.wikipedia.org/wiki/EICAR_test_file
    I use this string sometimes during security audits. Panda reports the string as Eicar.Mod

    I havn’t looked trough the code but I wonder if it contains the EICAR string or what hack Panda is trying to tell us here :)

  3. K.P. 21 October 2009 at 2:15 am Permalink

    Avast reports JS:Pdfka-FS exploit ?!

    Whatsup?

  4. Darknet 21 October 2009 at 3:09 am Permalink

    It’s a PDF exploitation tool and you guys are questioning why AV detects a PDF exploit inside, you baffle me really.

  5. M 21 October 2009 at 11:49 am Permalink

    What’s a moebius strip in this context?

  6. Rishabh Dangwal 21 October 2009 at 12:27 pm Permalink

    amateurs…

  7. Sebastian Haensch 21 October 2009 at 9:41 pm Permalink

    everyone was an amateur once….. even you

    detection routines trigger on hack tools like this since they contain exploit code or can be used for harmfull actions. it’s a common behavior.

    i talked to my guy at panda labs today, he was suprised that panda actually reports a virus.test.string instead of exploit.code, somethin wrong but nothin to worry about it will be detected as hacktool by panda soon