Document file vulnerability
analysis and exercises

Learn how to analyse vulnerabilities in Korean,
MS Office, and PDF files and analyse the shell code inside them.

Contact us on +82-2-2671-3344

Training guidance

Document file vulnerability analysis and exercises
  • Training hours
  • 09:30 to 17:30 (35 hours | 5 days)
  • Training locations
  • KnK Digital Tower, 220 Yeongsin-ro, Yeongdeungpo-gu, Seoul, Korea
  • Training costs
  • Inquiry, non-reimbursement process
  • Capacity
  • 10 to 20 people
  • Remarks
  • Lecture PPT, certificate for 80% attendance

Educational purposes

There has been a recent surge in malware that exploits vulnerabilities in document files. To analyse them, you need to understand how the vulnerabilities work and how the malware resides inside the document file. This course aims to help you understand the format of document files and analyse the shellcode to understand the behaviour of the malware.

Training for

  • Interested in different document file formats

  • Those interested in analysing document file malware with injected shellcode

  • Interested in developing a dedicated antivirus for document file vulnerability malware

Training schedule and content

Day 1

Structure and principles of the debugger
  • Structure of the debugger
  • General Purpose Registers
  • Stack
  • Debugger Events
  • Breakpoints
  • Immunity Debugger
  • Overview
  • CrackMe Labs
  • Immunity Debugger Script Lab
  • Implementing a debugger
  • Debuggers implemented in C
  • Debuggers implemented in Python

Day 2

Document file vulnerability analysis (1)
  • How to analyse HWP files
  • OLE file format
  • HWP File Formats
  • HWP Vulnerability Analysis Examples
  • MS Office file analysis
  • MS Office File Formats
  • MS Office vulnerability analysis examples

Day 3

Document file vulnerability analysis (2)
  • How to analyse PDF files
  • PDF file formats
  • Examples of PDF vulnerability analysis
  • How to analyse SWF files
  • SWF File Format
  • SWF Vulnerability Analysis Examples