Usr6 Posted January 26, 2013 Report Posted January 26, 2013 Obfuscation is widely used to attempt to hide malicious intent. There are a variety of automatic tools available to both obfuscate and deobfuscate code. What happens when automatic methods fail? What if you wish to create a malicious PDF for targeted use to subvert antivirus at a hardened client? Understanding obfuscation fundamentals will help you to both customize attack tool auto--generated PDFs as well as write custom PDFs as needed. What follows is an introduction to a variety of obfuscation techniques used by attackers to hide malicious intent and penetrate corporate networks.Download: http://www.giac.org/paper/gpen/468/pdf-obfuscation-primer/115906Author:Chad Robertson Quote