Extracting With pngdump.py – SANS Internet Storm Center

Date:

Share post:

Inspired by Xavier’s diary entry “A PNG Image With an Embedded Gift”, I updated my pngdump.py program to enable the extraction of chunks and extra data (similar to my other analysis tools, like pngdump.py).

Here is the analysis of the trojanized PNG file Xavier discussed:

Notice that this PNG file has 11 “items”: 10 valid items (1 header and 9 chunks) and one invalid item: unexpected data after the terminating chunk (IEND).

This can easily be selected with -s 11:

That’s the appended payload:

Didier Stevens

Senior handler

blog.DidierStevens.com

Source link

spot_img

Related articles

Crimson Desert’s Clunky RPG Action Made Me Crash Out

I’m trying to put all my thoughts about the time I spent with the medieval fantasy RPG Crimson...

When cybercriminals eat their own – Sophos News

At Sophos X-Ops, we often get queries from our customers asking if they’re protected against certain malware variants....

We Build PCs in the US, and We’ll Never Stop. Here’s Why.

At Velocity Micro, one of our greatest points of pride is that every PC is built in the...