Introduction

In this lab, we explore how cybercriminals leverage PDF files as a vector for distributing malware, exploiting vulnerabilities in popular software like Adobe Acrobat Reader. PDF files are a ubiquitous format for document exchange due to their versatility and compatibility across platforms. However, this widespread use has made them a prime target for attackers who embed malicious code to exploit unpatched vulnerabilities. In particular, this lab focuses on analyzing a packet capture (PCAP) file that documents a typical attack scenario: an unsuspecting user visits a compromised webpage, triggering a chain of events that leads to the automatic download and execution of malicious software.

As a Security Operations Center (SOC) analyst, you will dissect the network traffic to identify malicious URLs, analyze embedded JavaScript code, and investigate the exploitation of known vulnerabilities. This walkthrough will guide you through using tools like Wireshark for network traffic analysis, pdfid and pdf-parser for examining the structure and contents of the malicious PDF, and scdbg for shellcode emulation. Along the way, you will uncover how the malware is delivered, how it executes on the victim’s machine, and how it attempts to evade detection.

By the end of this lab, you'll have a deeper understanding of how attackers craft multi-stage exploits using seemingly benign files and how to trace and analyze such threats using forensic techniques. This hands-on investigation will reinforce your skills in malware analysis, network forensics, and defensive strategies to detect and mitigate similar attacks in real-world scenarios.


Unlock Your Full Learning Experience with BlueYard Labs

Sign up to track your progress, unlock exclusive labs, and showcase
your achievements—begin your journey now!
Join for Free