Главная
Study mode:
on
1
Intro
2
Why printers?
3
How to print?
4
Overview
5
Attacker model: Physical access
6
Attacker model: Web attacker
7
Denial of service
8
Protection bypass
9
Print job manipulation
10
Evaluation results
11
Printer Exploitation Toolkit (PRET)
12
PostScript in the web?
13
Conclusions
Description:
Explore a comprehensive analysis of network printer vulnerabilities and exploitation techniques in this 20-minute IEEE conference talk. Delve into the methodology for conducting security analyses on printers and learn about the open-source Printer Exploitation Toolkit (PRET). Discover the results of evaluating 20 printer models from various vendors, revealing common vulnerabilities such as Denial-of-Service attacks and print job extraction. Gain insights into advanced cross-site printing techniques and printer CORS spoofing that enable attacks from the Internet. Examine the application of these attacks to systems beyond typical printers, including Google Cloud Print and document processing websites.

Exploiting Network Printers

IEEE
Add to list