YoVDO

Printer Hacking Adventures - Exploiting Network Vulnerabilities

Offered By: nullcon via YouTube

Tags

Network Security Courses Cybersecurity Courses Embedded Systems Courses Linux Courses Reverse Engineering Courses Exploit Development Courses Vulnerability Analysis Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the often overlooked security vulnerabilities of networked printers in this 45-minute conference talk from Nullcon Berlin 2024. Dive deep into the inner workings of office printers, examining their underlying Linux or proprietary real-time operating systems. Learn techniques for accessing and debugging closed, undocumented printer firmware. Examine three detailed exploit chains for various printer models, including memory corruption exploits for CANON ImageCLASS and logic bug chains for Lexmark printers, both leading to full device compromise. Gain insights into exploits submitted as part of the annual Pwn2Own competition, with a thorough breakdown of the bugs and exploitation methods. Enhance your understanding of network security, firmware exploits, and cybersecurity challenges in commonly overlooked office equipment.

Syllabus

Nullcon Berlin 2024 | Printer Hacking Adventures - Peter Geissler


Taught by

nullcon

Related Courses

Dal Reverse engineering alla stampa 3D
University of Naples Federico II via Federica
Rapid Manufacturing
Indian Institute of Technology Kanpur via Swayam
Generative Design for Industrial Applications
Autodesk via Coursera
Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX
Functional And Conceptual Design
Indian Institute of Technology Madras via Swayam