YoVDO

Exploiting Network Printers

Offered By: IEEE via YouTube

Tags

Network Security Courses Cybersecurity Courses Denial-of-Service Attacks Courses

Course Description

Overview

Explore a comprehensive analysis of network printer vulnerabilities and exploitation techniques in this 20-minute IEEE conference talk. Delve into the methodology for conducting security analyses on printers and learn about the open-source Printer Exploitation Toolkit (PRET). Discover the results of evaluating 20 printer models from various vendors, revealing common vulnerabilities such as Denial-of-Service attacks and print job extraction. Gain insights into advanced cross-site printing techniques and printer CORS spoofing that enable attacks from the Internet. Examine the application of these attacks to systems beyond typical printers, including Google Cloud Print and document processing websites.

Syllabus

Intro
Why printers?
How to print?
Overview
Attacker model: Physical access
Attacker model: Web attacker
Denial of service
Protection bypass
Print job manipulation
Evaluation results
Printer Exploitation Toolkit (PRET)
PostScript in the web?
Conclusions


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network