Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      They have just found two serious vulnerabilities thanks to a PDF that they have uploaded to VirusTotal

      Recommended Posts

      Staff

      A few months ago, an anonymous user uploaded a PDF file to the online platform 

      Hidden Content

        Give reaction to this post to see the hidden content.
       in order to see if it was detected by any of the more than 50 antivirus engines that have this platform or, otherwise, none of them detected it .This PDF file apparently seemed harmless and could have been a user who, after downloading it, wanted to verify that it did not hide anything. However, it seems that this PDF file hid something quite serious.

      This PDF file immediately called the attention of several security researchers subscribed to the platform, researchers who soon began to analyze it in depth.Within this PDF file they have been able to find two very dangerous exploits that took advantage of two security flaws still unknown in the Adobe software and in Windows.

      Hidden Content

        Give reaction to this post to see the hidden content.

      The Adobe vulnerability ( CVE-2018-4990 ) is a failure to execute remote code, while the Windows security failure ( CVE-2018-8120 ) is a privilege escalation failure to be able to execute code at the highest level of permits. The PDF file did not include the final payload and was not 100% complete, so it is believed that it has never been used.

      Neither this malicious PDF , nor the exploits that it hid, had never been seen on the network until they were sent to VirusTotal. It is not well known why this PDF came to this online security platform, whether it was from someone who got it in some way or by some rookie hackerwho does not know that all the files sent to VirusTotal are sent to security companies and researchers, even if apparently clean, for in-depth analysis.

      What is certain is that, thanks to VirusTotal, we have been able to avoid a series of very dangerous computer attacks, being able to know the vulnerability before it was used to endanger the security of the users.

      Update Windows and Adobe to protect yourself from these two vulnerabilities

      This PDF was detected in March of this same year, and in the second week of May Microsoft and Adobe released their corresponding security patches without giving specific details about these security flaws. However, in order to give system administrators enough time to update their infrastructures, it has not been until now that Microsoft and Adobe have made public the vulnerabilities that have been detected thanks to this PDF uploaded to VirusTotal .

      To protect ourselves from these two failures and make these exploits useless, we must install the latest Windows and Adobe security patches. These vulnerabilities were already solved the second week of May with the corresponding patches, so, installing these patches we will be fully protected.

      What do you think of these two security flaws discovered and solved thanks to VirusTotal?

      Share this post


      Link to post
      Share on other sites

      I tell what happened the lamer bought exploit the 0day for adobe acrobat from 0day.today, and just fuked up the exploit

      let dos this virustotal

      Share this post


      Link to post
      Share on other sites
      Staff

      They buy or download a crypter and the first thing they do is upload it to VirusTotal, and then they tell you that they detect it as antivirus.
      They pull the work of days even of months in a few minutes, fucking lamers .....

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Protect PDFs Better than Normal PDF Restricting Tools
          UNLIKE normal PDF encryption and protection utilities only adding restrictions on PDF files, PDF Anti-Copy reprocesses all the words and graphics on the sensitive PDF pages to secure PDF documents, without changing the original content formatting. Processed PDF files could be opened and viewed by PDF Readers, but copying and converting the content on the Anti-Copy Pages will not work even the cracker uses the PDF unlocking or restriction removing programs.
          PDF Anti-Copy Features
          PDF Text Anti-copy PDF Text Anti-copy
          No Password Required No Password Required Protection & Encryption
          Prevent Converting Prevent Converting to editable formats like MS Word, Excel and TXT etc.
          Page range Protection Selective PDF Page Protection
          PDF Restriction Restrict PDF to protect from printing
          PDF Permission Global PDF permission prohibits copy function
          Remain PDF Layout Keep the original PDF Layout and quality
          Clean Software 100% Clean
          Multiple Languages
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.  
        • By dEEpEst
          How to Stop Instagram Data Tracking to Limit Targeted Ads
           ⚜ We Have Shared A Step-By-Step Guide On Limiting Instagram Data Tracking To Stop Targeted Ads. 
          🔹Step 1: First of all, launch the Facebook app on your Android smartphone.
          🔹Step 2: Now tap on the three horizontal lines as shown below.
          🔹Step 3: Next, tap on the Settings & Privacy option.
          🔹Step 4: Under Settings & Privacy, tap on the ‘Settings.’
          🔹Step 5: Now scroll down and tap on the ‘Ad Preferences’ option.
          🔹Step 6: Now tap on the ‘Ad Settings’ option.
          🔹Step 7: Under the Ad Settings, scroll down and tap on the ‘Data about your activity from partners’
          🔹Step 8: On the next page, use the toggle button to turn off ‘Facebook’ and ‘Instagram.’
          🔹Step 9: Now go back and tap on the ‘Categories used to reach you’
          🔹Step 10: Tap on the ‘Interest Categories’
          🔹Step 11: You need to opt-out of all the Interest Categories
          🔹Step 12: You need to do the same for ‘Other Categories’ as well.
          That’s it! You are done. Now you won’t get highly accurate ads on Instagram and Facebook.
           
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. PDFill Enterprise has all the functions of PDFill Professional.
          The users can draw many types of Office Shapes into PDF document to highlight the important items inside PDF document. The shapes come with styled Text can bring attention to those items. This helps readers better understand the content of the PDF document.
          Recently Used Shapes, Lines, Rectangles, Basic Shapes, Block Arrows, Equation Shapes, Flowchart, Stars and Banners, Callouts, Action Buttons.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. This tool only extracts information that is public, not use for private or illegal purposes.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. NullRAT
          Remote Access Trojan that uses Discord as C&C
          One of the main things about this RAT is it will be under 8mb, so you can always upload it without nitro
          That's also why it doesn't have too many features compared to other Discord RATs
          Features:
              Find the public IP of the victim
              Find their Discord token(s)
              Find victim's approximate location
              Add payload to startup with one command
              Take pictures using victim's webcam
              Take screenshot of victim's PC
              Download files from victim's PC
              Upload files to victim's PC
              Get some information about their PC
              Execute command prompt commands (Thank you Sp00p)
              Browse around their PC, see directory contents, and much more It's windows-only by the way; sorry :(
          Fourth stable release (Upgrade ASAP)
          This release contains important changes and tweaks
          You should upgrade right now basically
          Changes are mentioned in the changelog.md file

          Hidden Content
          Give reaction to this post to see the hidden content.