Printers belong
arguably to the most common devices we use. They are available in
every household, office, company, governmental, medical, or education
institution.
From a security
point of view, these machines are quite interesting since they are
located in internal networks and have direct access to sensitive
information like confidential reports, contracts or patient recipes.
TL;DR: In this blog post we give an overview of attack scenarios based on network printers, and show the possibilities of an attacker who has access to a vulnerable printer. We present our evaluation of 20 different printer models and show that each of these is vulnerable to multiple attacks. We release an open-source tool that supported our analysis: PRinter Exploitation Toolkit (PRET) https://github.com/RUB-NDS/PRET
Full results are
available in the master thesis of Jens Müller and our paper.
Furthermore, we have
set up a wiki (http://hacking-printers.net/) to share knowledge on
printer (in)security.
The highlights of the entire survey will be presented by Jens Müller for the first time at RuhrSec in Bochum.
The highlights of the entire survey will be presented by Jens Müller for the first time at RuhrSec in Bochum.