"first they ignore you, then they threaten to sue you, then they deny the vulnerability, then you p0wn them" -- with apologies to Mahatma Gandhi
archimede:~$ file pocorgtfo05.pdf pocorgtfo05.pdf: ISO 9660 CD-ROM filesystem data 'TetrangOS ' (bootable)
and
archimede:~$ unzip -v pocorgtfo05.pdf Archive: pocorgtfo05.pdf warning [pocorgtfo05.pdf]: 26368859 extra bytes at beginning or within zipfile (attempting to process anyway) Length Method Size Ratio Date Time CRC-32 Name -------- ------ ------- ----- ---- ---- ------ ---- 0 Stored 0 0% 08-04-14 21:11 00000000 PEXternalizer/ 0 Stored 0 0% 08-04-14 21:11 00000000 PEXternalizer/gerbers/ 36757 Defl:X 8364 77% 08-04-14 21:11 8951ef3a PEXternalizer/gerbers/mPEXternalizer.GBL 350 Defl:X 178 49% 08-04-14 21:11 41ef7268 PEXternalizer/gerbers/mPEXternalizer.XLN 43198 Defl:X 9972 77% 08-04-14 21:11 1d07892a PEXternalizer/gerbers/mPEXternalizer.GTL 126902 Defl:X 28569 78% 08-04-14 21:11 9e23dd0a PEXternalizer/gerbers/PEXternalizer.GTL 10607 Defl:X 1999 81% 08-04-14 21:11 1362f6a4 PEXternalizer/gerbers/mPEXternalizer.GTS 1079 Defl:X 394 64% 08-04-14 21:11 2b2fd9f2 PEXternalizer/gerbers/PEXternalizer.XLN 20909 Defl:X 4710 78% 08-04-14 21:11 ea04d9a4 PEXternalizer/gerbers/mPEXternalizer.GBO 45783 Defl:X 9521 79% 08-04-14 21:11 fa67abdf PEXternalizer/gerbers/PEXternalizer.GBO 35428 Defl:X 7655 78% 08-04-14 21:11 a9df2250 PEXternalizer/gerbers/PEXternalizer.GTO 1268 Defl:X 406 68% 08-04-14 21:11 72fecc3a PEXternalizer/gerbers/mPEXternalizer.GBS 9731 Defl:X 2442 75% 08-04-14 21:11 ab8908e0 PEXternalizer/gerbers/mPEXternalizer.GKO 128653 Defl:X 29251 77% 08-04-14 21:11 40fe72f8 PEXternalizer/gerbers/PEXternalizer.GBL 11186 Defl:X 2061 82% 08-04-14 21:11 c540d525 PEXternalizer/gerbers/PEXternalizer.GBS 9012 Defl:X 2246 75% 08-04-14 21:11 b25e9619 PEXternalizer/gerbers/PEXternalizer.GKO 30759 Defl:X 6634 78% 08-04-14 21:11 2ffd2bb9 PEXternalizer/gerbers/mPEXternalizer.GTO 18201 Defl:X 3318 82% 08-04-14 21:11 73340665 PEXternalizer/gerbers/PEXternalizer.GTS 18026 Defl:X 6802 62% 08-04-14 21:11 314a1dd2 PEXternalizer/LICENSE 0 Stored 0 0% 08-04-14 21:11 00000000 PEXternalizer/eagle/ 118946 Defl:X 11313 91% 08-04-14 21:11 a1811f8e PEXternalizer/eagle/PEXternalizer.sch 67047 Defl:X 9735 86% 08-04-14 21:11 9a64483a PEXternalizer/eagle/PEXternalizer.brd 59982 Defl:X 8815 85% 08-04-14 21:11 a20ed85f PEXternalizer/eagle/mPEXternalizer.brd 54806 Defl:X 6088 89% 08-04-14 21:11 c7201662 PEXternalizer/eagle/mPEXternalizer.sch 890 Defl:X 460 48% 08-04-14 21:11 4079216b PEXternalizer/PEXternalizer-BOM.csv 0 Stored 0 0% 08-04-14 21:11 00000000 PEXternalizer/eagle-support/ 75865 Defl:X 7422 90% 08-04-14 21:11 21e5cb30 PEXternalizer/eagle-support/con-pci_express%28pci-e%29.lbr 293800 Defl:X 32560 89% 08-04-14 21:11 683f0417 PEXternalizer/eagle-support/securinghardware.lbr 42631 Defl:X 4062 91% 08-04-14 21:11 f9489239 PEXternalizer/eagle-support/con-heo.mini_pci_express.lbr 1844 Defl:X 991 46% 08-04-14 21:11 ef785144 PEXternalizer/README.md 0 Stored 0 0% 08-04-14 21:11 00000000 collision/ 447780 Defl:X 248722 45% 08-04-14 21:11 1d2cf7e7 collision/mbr_shell_rar1.pdf 110809 Defl:X 50821 54% 08-04-14 21:11 b7e897e3 collision/jpg-rar0.jpg 2347 Defl:X 945 60% 08-04-14 21:11 8fa25759 collision/msha1.py 354 Defl:X 167 53% 08-04-14 21:11 fa48f512 collision/readme.txt 447780 Defl:X 248722 45% 08-04-14 21:11 dbf86217 collision/mbr_shell_rar0.pdf 2560 Defl:X 997 61% 08-04-14 21:11 c789f50e collision/make_collision.py 110809 Defl:X 50823 54% 08-04-14 21:11 fa6f5705 collision/jpg-rar1.jpg 1294 Defl:X 604 53% 08-04-14 21:11 9899e045 lazy.c 549 Defl:X 278 49% 08-04-14 21:11 677cef1f manulmascot.txt 7873 Defl:X 2737 65% 08-04-14 21:11 4cf0df95 mpbs.asm 2285 Defl:X 975 57% 08-04-14 21:11 d6685e2a rosetta-rick.swf 0 Stored 0 0% 08-04-14 21:11 00000000 rosettaflash/ 0 Stored 0 0% 08-04-14 21:11 00000000 rosettaflash/utils/ 1340 Defl:X 537 60% 08-04-14 21:11 8e5b076b rosettaflash/utils/utils.go 18092 Defl:X 6806 62% 08-04-14 21:11 4e46f4a1 rosettaflash/LICENSE 0 Stored 0 0% 08-04-14 21:11 00000000 rosettaflash/zlibStream/ 10608 Defl:X 2446 77% 08-04-14 21:11 1425ab06 rosettaflash/zlibStream/zlibStream.go 0 Stored 0 0% 08-04-14 21:11 00000000 rosettaflash/flashFile/ 973 Defl:X 389 60% 08-04-14 21:11 431e95ba rosettaflash/flashFile/flashFile.go 0 Stored 0 0% 08-04-14 21:11 00000000 rosettaflash/huffman/ 9786 Defl:X 1906 81% 08-04-14 21:11 9f69b64f rosettaflash/huffman/huffman.go 0 Stored 0 0% 08-04-14 21:11 00000000 rosettaflash/adler32_fuzzer/ 1306 Defl:X 536 59% 08-04-14 21:11 64b13546 rosettaflash/adler32_fuzzer/adler32_fuzzer.go 0 Stored 0 0% 08-04-14 21:11 00000000 rosettaflash/adler32_mod/ 1465 Defl:X 648 56% 08-04-14 21:11 c111e13a rosettaflash/adler32_mod/adler32_mod.go 240 Defl:X 186 23% 08-04-14 21:11 017e3177 rosettaflash/CREDITS 0 Stored 0 0% 08-04-14 21:11 00000000 rosettaflash/charset/ 1139 Defl:X 440 61% 08-04-14 21:11 6da2eaae rosettaflash/charset/charset.go 0 Stored 0 0% 08-04-14 21:11 00000000 rosettaflash/PoC/ 1158 Defl:X 517 55% 08-04-14 21:11 61d7c149 rosettaflash/PoC/eval_load-ascii.swf 148 Defl:X 104 30% 08-04-14 21:11 b8d6cec9 rosettaflash/PoC/check_alphanum.py 248 Defl:X 144 42% 08-04-14 21:11 72266fc7 rosettaflash/PoC/eval_load.as 377 Defl:X 286 24% 08-04-14 21:11 813608cc rosettaflash/PoC/rickroll.swf 179 Defl:X 136 24% 08-04-14 21:11 6d8363f1 rosettaflash/PoC/rickroll.as 393 Defl:X 220 44% 08-04-14 21:11 b16dd2e2 rosettaflash/PoC/UniversalExfiltrator.as 1231 Defl:X 554 55% 08-04-14 21:11 a18a5d35 rosettaflash/PoC/rickroll-ascii.swf 1629 Defl:X 639 61% 08-04-14 21:11 5218837d rosettaflash/PoC/UniversalExfiltrator-ascii.swf 541 Defl:X 360 34% 08-04-14 21:11 0c957a2b rosettaflash/PoC/UniversalExfiltrator.swf 294 Defl:X 209 29% 08-04-14 21:11 6de9a584 rosettaflash/.gitignore 1085 Defl:X 570 48% 08-04-14 21:11 8e98d963 rosettaflash/README.md 2796 Defl:X 1137 59% 08-04-14 21:11 decc6797 rosettaflash/rosettaflash.go 962 Defl:X 468 51% 08-04-14 21:11 09e790ac style.txt 56807352 Defl:X 56275027 1% 08-04-14 21:11 be2ccd2d pocorgtfo04.pdf -------- ------- --- ------- 59261442 57106024 4% 74 files
and, by now, you do recall that within 0x04 lies other interesting material, do you not?
As usual there is more...
wittgenstein:~$ sudo mount -o ro -t iso9660 pocorgtfo05.pdf /mnt [sudo] password for arrigo: wittgenstein:~$ cd /mnt/ wittgenstein:/mnt$ ls -l total 1443 -r-xr-xr-x 1 root root 2048 Jul 17 12:00 boot.cat -r-xr-xr-x 1 root root 51 Jul 17 12:00 readme.txt -r-xr-xr-x 1 root root 1474560 Jul 17 12:00 tetrangl.img
That worked!
wittgenstein:/mnt$ cat readme.txt Never gonna give you up! Never gonna let you down! wittegenstein:/mnt$ file * boot.cat: FoxPro FPT, blocks size 0, next free block index 16777216 readme.txt: ASCII text tetrangl.img: x86 boot sector
So, what should you do next? Well, how about a little emulation...
archimede:~$ qemu-system-i386 -cdrom pocorgtfo05.pdf