Copy link to clipboard
Copied
The general idea of the project is to manage to make one little change and after that the document not seen as modifyed when you go to file/properties/description. I try exporting it in word or powerpoint and after i cnvert i as pdf..Then is not seen as modified but the creator and application is deifferent. THis pdf is made with oracle aplication IT tool and if you use word this is going to change,,,,if you copy the pdf whole bcause everything is the same is being modifiyed...I 'm willing to pay 300 euros if you can get the job done. Thnak you very much for your time! 🙂
Copy link to clipboard
Copied
+++MODIFIED REPLY
Whooah there..!!
Slow down your horses brother...
That is a generous offer, but what if what you're asking about is something really easy to do with a shell script developed in python on Kali Linux?
You also started explaining everything somewhat clear but at the end of your thread it got all messed up.
If I understood correctly, every file will change when you export to another file format using MS Word or PowerPoint?
That is a given, and basically the file properties and attributes are logged AND handled at the operating system level (unfortunately).
Even everything that we type here is logged as we speak.
Moreover, our cellphone carriers, Internet service providers, and telephone trunk companies are required by law to backup everything that transit through their lines and networks.
Besides, every business regardless of their size, usually performs daily, weekly, monthly, and yearly backups of all the logged activity in their comoputers.
If what you're asking has anything to do with achieving this task using Acrobat javascript, you need to be more specific.
I don't think this an appropriate practice.
However, there is metadata information and personal information about the creator of the file that may be easily removed, to include encrypting the file.
But like you said, what is the point if you export the file to MS Word, for example?
None of this makes sense unless this is such an important file that needs to be (or should be) hidden and accessed only through permissions that will be restricted with Group Policy in addition to hiding and encrypting its location.
Do I sound too innocent?
Such file should be placed in a hidden folder and enforce with password protection from unauthorized users via Group Policy (or similar).
You have to come clean on this one and explain why do you need to sanitize and/or obfuscate the PDF's file properties.
What about the file name?
What does this PDF do?
Is it a fillable form with confidential information in it?
Personal Identifiable Information that can't be disclosed perhaps?
Otherwise, this looks to me more like a shady practice.
In my very personal opinion, no disrespect to you (whoever you are), but it looks like what you're really asking about is to be able to disguise a PDF with illegitimate file properties.
This reminds of how often malicious software is constantly wandering in the wild and fooling firewall routers.
Allowing such files (if infected or purposedly tampered with exploits) to interact in a secured network and out to the Internet may also leak the users' DNS queries, including, but not limited to, exposing non-routable private IP-addresses (even through the best VPNs in the matket today).
And last, this also reminds me of of how often files like this go undetected from a good antivirus (even if the antivirus is configured with a tight heuristic scan) .
Remember Subzero back in the early 2000's?
Is kind of funny though, to observe how times have changed, and to see this new breed of euphemistic "ethical-hacking" millenial parlance in certification courses now referring to trojans as "Remote Administration Tools" (RAT) .
That sounds way too professional, considering what a 19 year old was capable of doing with Subzero in someone else's computer.
As a matter of fact, now I'm on red.
Subzero is like a customer care chat session in which the tech support guy doesn't read or follow a script, and will not ask you nicely if you'll allow them to take control of your machine to help you with your technical issue.
Sounds like Windows 10 to me.
But anyway, Won't you agree this is a little too arcane and somewhat dark?
Specifically , since you've mentioned about Oracle?