YoVDO

Printer Hacking Adventures - Exploiting Network Vulnerabilities

Offered By: nullcon via YouTube

Tags

Network Security Courses Cybersecurity Courses Embedded Systems Courses Linux Courses Reverse Engineering Courses Exploit Development Courses Vulnerability Analysis Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the often overlooked security vulnerabilities of networked printers in this 45-minute conference talk from Nullcon Berlin 2024. Dive deep into the inner workings of office printers, examining their underlying Linux or proprietary real-time operating systems. Learn techniques for accessing and debugging closed, undocumented printer firmware. Examine three detailed exploit chains for various printer models, including memory corruption exploits for CANON ImageCLASS and logic bug chains for Lexmark printers, both leading to full device compromise. Gain insights into exploits submitted as part of the annual Pwn2Own competition, with a thorough breakdown of the bugs and exploitation methods. Enhance your understanding of network security, firmware exploits, and cybersecurity challenges in commonly overlooked office equipment.

Syllabus

Nullcon Berlin 2024 | Printer Hacking Adventures - Peter Geissler


Taught by

nullcon

Related Courses

An Introduction to Computer Networks
Stanford University via Independent
Computer Networks
University of Washington via Coursera
Computer Networking
Georgia Institute of Technology via Udacity
Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Model Building and Validation
AT&T via Udacity