Conduct cyber attacks with this PDF code of yours. This PDF code provides the ability to execute code in PDF using PDF, JavaScript and FontForge
کد:
%PDF-1.4 1 0 obj <</Type/Catalog/Pages 2 0 R>> endobj 2 0 obj <</Type/Pages/Kids[3 0 R]/Count 1>> endobj 3 0 obj <</Type/Page/Parent 2 0 R/Resources<</XObject<</Im1 4 0 R>>>>/MediaBox[0 0 612 792]/Contents 5 0 R>> endobj 4 0 obj <</Type/XObject/Subtype/Image/Width 612/Height 792/ColorSpace/DeviceRGB/BitsPerComponent 8/Filter/DCTDecode/Length 3792>> stream ...(here comes the jpeg image data)... endstream endobj 5 0 obj <</Length 78/Filter/FlateDecode>> stream q 1 0 0 1 0 0 cm /Im1 Do Q BT /Helv 12 Tf 1 0 0 1 100 600 Tm (This is a malicious PDF) Tj ET endstream endobj xref 0 6 0000000000 65535 f 0000000015 00000 n 0000000063 00000 n 0000000157 00000 n 0000000283 00000 n 0000000376 00000 n trailer <</Size 6/Root 1 0 R/ID [<5df4e2a1a5a5a5a5a5a5a5a5><5df4e2a1a5a5a5a5a5a5a5a5>]>> startxref 455 %%EOF
کد:
[HASHTAG="t2959"]code[/HASHTAG] BY E1.Coders %PDF-1.4 %âãÏÓ 1 0 obj << /Type /Catalog /Pages 2 0 R >> endobj 2 0 obj << /Type /Pages /Kids [3 0 R] /Count 1 >> endobj 3 0 obj << /Type /Page /Parent 2 0 R /Resources << /ProcSet [/PDF /Text /ImageB /ImageC /ImageI] >> /MediaBox [0 0 612 792] /Contents 4 0 R >> endobj 4 0 obj << /Length 39 >> stream q 0 0 612 792 cm /Im0 Do Q BT /Font <</Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helv /Encoding /WinAnsiEncoding >> findfont 12 scalefont setfont 100 700 moveto (Click the button to launch the Calculator app) show 100 650 moveto (This requires user permission and can be a security risk) show 100 600 moveto (/Launch /System /Registrar /Calc) (Run) 5 0 R /ExecForm endstream endobj xref 0 5 0000000000 65535 f 0000000015 00000 n 0000000073 00000 n 0000000205 00000 n 0000000318 00000 n trailer << /Root 1 0 R /Size 5 >> startxref 472 %%EOF