![pdf info pdf info](http://www.cjezegou.fr/wp-content/uploads/2019/01/FC-reseau_info-pdf-723x675.jpg)
PDF INFO PDF
The ‘%’ character is a comment in PDF, so the above example actually presents the first and second line being comments, which is true for all PDF documents. The temp.pdf PDF document uses the PDF specification 1.3.
![pdf info pdf info](https://vendenheim.fr/wp-content/uploads/2019/09/mep_infoenergie_a5_impr-pdf-adobe-acrobat-pro-dc.jpg)
If we want to find that out, we can use the hex editor or simply use the xxd command as below:Ġ000000: 2550 4446 2d31 2e33 0a25 c4e5 f2e5 eba7 %PDF-1.3.%…… This is the first line of a PDF file and specifies the version number of the used PDF specification which the document uses. The basic structure of a PDF file is presented in the picture below:Įvery PDF document has the following elements: Header PDF has more functions than just text: it can include images and other multimedia elements, be password protected, execute JavaScript and so on. There are almost 800 pages of the documentation for the PDF file format alone, so reading through that is not something to do on a whim. The PDF file format specification is publicly available here and can be used by anyone interested in PDF file format. PDF is a portable document format that can be used to present documents that include text, images, multimedia elements, web page links and more. In this article, we’ll take a look at the PDF file format and its internals. In our case, we should first understand the PDF file format in detail. Whenever we want to discover new vulnerabilities in software, we should first understand the protocol or file format in which we’re trying to discover new vulnerabilities.