PDF: The Aerial trick
(How to crack any pdf security setting)

by JimBob

(31 October 1997)


Courtesy of Fravia's page of reverse engineering

Well, short and directly to the point, I added some info about Aerial code at the end

Hi,
 I visited your site last night and saw the info on 
cracking Acrobat and PDFs. I've been interested in this file format 
for awhile now since it is such a versitile format.  I would like to 
suggest another aspect of PDF cracking, extracting embedded fonts.

Also, 
I have discovered that as long as you can open a pdf, text extraction 
is no problem, no matter what the security settings are. I extracted 
ghiric7.pdf text without a hitch.  The secret is a free plugin for 
exchange from Ambia (www.ambia.com).  It allows extracting the text 
to RTF format, and will do so even if selecting, printing, modifying 
etc are all pw protected, it doesnt matter, it still extracts it.  It 
is supposed to extract the pictures too, but I've found that it's 
just not that good at it.

You must first run Exchange and laod a PDF, then activate the aerial 
toolbar.  Close the file and the toolbar stays active.  Now even if 
you load say gharic7.pdf, which makes the Acrobat toolbar disappear, 
the Ambia plugin stays active, select Extract to RTF and the text is 
yours. Oh yea the plugin is called Aerial.

Can't wait to see how this project comes out!

					JimBob
                    
Some of you may like to know that inside Aerial there are some
cmp dword ptr (eax+6CH), 1Eh

And that 1Eh (0x1E) corresponds to Decimal 30, like 30 days... and yes, there is also another protection scheme there, as stupid as this one.
(c) JimBob 1997. All rights reserved
You are deep inside fravia's page of reverse engineering, choose your way out:

redBack to the PDF-Project
homepage links red anonymity +ORC students' essays Academy database
tools cocktails antismut CGI-scripts search_forms mail_Fravia
Is reverse engineering illegal?