Exploiting Network Printers
The idea of a paperless office has been dreamed of for more than three decades. However, nowadays printers are still one of the most essential devices for daily work and common Internet users. Instead of removing them, printers evolved from simple devices into complex network computer systems, installed directly into company networks, and carrying considerable confidential data in their print jobs. This makes them to an attractive attack target.
By Jens Müller
Full Abstract & Presentation Materials:
https://www.blackhat.com/us-17/briefings.html#exploiting-network-printers
Видео Exploiting Network Printers канала Black Hat
By Jens Müller
Full Abstract & Presentation Materials:
https://www.blackhat.com/us-17/briefings.html#exploiting-network-printers
Видео Exploiting Network Printers канала Black Hat
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Owning a Building: Exploiting Access Control and Facility Management Systems by Billy RiosThe Memory Sinkhole - Unleashing An X86 Design Flaw Allowing Universal Privilege EscalationDEF CON 24 - Hardware Hacking Village - Matt DuHarte - Basic Firmware ExtractionThe Machines That Betrayed Their Masters by Glenn WilkinsonSirenJack: Cracking a 'Secure' Emergency Warning Siren SystemIoT Security: Backdooring a smart camera by creating a malicious firmware upgradeHow Hackers Could Wirelessly Bug Your Office48 Dirty Little Secrets Cryptographers Don’t Want You To KnowInk Cartridges Are A ScamWriting Bad @$$ Malware For OS XDEF CON 23 - Ryan Castellucci - Cracking CryptoCurrency BrainwalletsHow Israel Rules The World Of Cyber Security | VICE on HBOPrinter ServicesWhat's on the Wireless? Automating RF Signal IdentificationExploiting the DRAM Rowhammer Bug to Gain Kernel PrivilegesThis Toy Can Open Any GarageKey Reinstallation Attacks: Breaking the WPA2 ProtocolIoT Security Cameras Vulnerability DemonstrationDEF CON 25 (2017) - Weaponizing Machine Learning - Petro, Morris - Stream - 30July2017