Penetration Testing mailing list archives

Re: Suspecious JPEG Files


From: "Nikhil Wagholikar" <visitnikhil () gmail com>
Date: Thu, 7 Feb 2008 11:15:13 +0300

Hello Poddima,

You can carry/copy/transfer those files to UNIX/Linux system, and
check whether they are genuine JPEG files or some executable file
renamed to JPEG extension. This file extension checking task can be
carried out using UNIX/Linux 'file' command.

Kindly read the man page of UNIX/Linux for more information on 'file' command.

You can get the man page of 'file' command online also:

UNIX - http://unixhelp.ed.ac.uk/CGI/man-cgi?file
Linux - http://linux.die.net/man/1/file

---
NIKHIL WAGHOLIKAR
Information Security Analyst
NII Consulting
Web: http://www.niiconsulting.com/
Security Products: http://www.niiconsulting.com/products.html



On 1 Feb 2008 17:09:24 -0000,  <poddima () yahoo com> wrote:
Hello,


I recieved via e-mail two JPEG files, one of them was not opened properly (Default error message was displayed on the 
Windows Picture Viewer).

The sender is known to me, and I suspect he was trying to attack my computer (I recieved also an infected executable 
file from him just a short time before, and I didn't opened it).


If anyone is interested in trying to analyse the files, I'd be mostly grateful. Please contact me and I will send you 
the files.


Thanks!

------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------



------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------


Current thread: