Quelle: AliExpress
Moderne Drucker sind vollwertige Computer.
Quelle: The State of Printer Security (HP, 2018)
gregory@house ~ $ nmap -sT -p 1-65535 10.0.0.1 Starting Nmap 7.92 ( https://nmap.org ) at 2021-10-26 01:30 CEST Nmap scan report for 10.0.0.1 Host is up (0.0031s latency). Not shown: 65527 closed tcp ports (conn-refused) PORT STATE SERVICE 80/tcp open http 443/tcp open https 515/tcp open printer 631/tcp open ipp 3911/tcp open prnstatus 5355/tcp open llmnr 8080/tcp open http-proxy 9100/tcp open jetdirect Nmap done: 1 IP address (1 host up) scanned in 7.87 seconds gregory@house ~ $
Drucker sind üblicherweise in Netzwerken sicht- und erkennbar.
Quelle: HP Jetdirect Security Guidelines, 2007
Quelle: HP Jetdirect Security Guidelines, 2007
PJL Kommando mit 7 MB ohne Verschlüsselung; Quelle: Print Me If You Dare Präsentation, 28C3, 2011
iso.3.6.1.2.1.1.1.0 = STRING: "HP ETHERNET MULTI-ENVIRONMENT" iso.3.6.1.2.1.1.2.0 = OID: iso.3.6.1.4.1.11.2.3.9.1 iso.3.6.1.2.1.1.3.0 = Timeticks: (476693112) 55 days, 4:08:51.12 iso.3.6.1.2.1.1.5.0 = STRING: "TheThing" iso.3.6.1.2.1.25.3.2.1.3.1 = STRING: "HP OfficeJet Pro 9010 series" iso.3.6.1.2.1.43.5.1.1.17.1 = STRING: "TH73E231X9" iso.3.6.1.2.1.43.11.1.1.6.1.1 = STRING: "cyan ink HP 3JA27A" iso.3.6.1.2.1.43.11.1.1.6.1.2 = STRING: "magenta ink HP 3JA28A" iso.3.6.1.2.1.43.11.1.1.6.1.3 = STRING: "yellow ink HP 3JA29A" iso.3.6.1.2.1.43.11.1.1.6.1.4 = STRING: "black ink HP 3JA30A" …
Zugänglich aus lokalem Netzwerk via snmpwalk.
Quelle: SoK: Exploiting Network Printers
Quelle: SoK: Exploiting Network Printers
Google Cloud Printing ist seit 31. Dezember 2020 End-Of-Life.
René „Lynx“ Pfeiffer was born in the year of Atari's founding and the release of the game Pong. Since his early youth he started taking things apart to see how they work. He couldn't even pass construction sites without looking for electrical wires that might seem interesting. The interest in computing began when his grandfather bought him a 4-bit microcontroller with 256 byte RAM and a 4096 byte operating system, forcing him to learn Texas Instruments TMS 1600 assembler before any other programming language.
After finishing school he went to university in order to study physics. He then collected experiences with a C64, a C128, two Commodore Amigas, DEC's Ultrix, OpenVMS and finally GNU/Linux on a PC in 1997. He is using Linux since this day and still likes to take things apart und put them together again. Freedom of tinkering brought him close to the Free Software movement, where he puts some effort into the right to understand how things work – which he still does.
René is a senior systems administrator, a lecturer at the University of Applied Sciences Technikum Wien and FH Burgenland, and a senior security consultant. He uses all the skills in order to develop security architectures, maintain/improve IT infrastructure, test applications, and to analyse security-related attributes of applications, networks (wired/wireless, components), (cryptographic algorithms), protocols, servers, cloud platforms, and more indicators of modern life. SEC4YOU Advanced IT Services GmbH benefits from his experience. If you are interested in putting your security to the test, please let us know.
Die DeepSec GmbH veranstaltet seit 2007 jährlich im November die DeepSec In-Depth Security Conference in Wien. Die DeepSec bringt als neutrale Plattform die Sicherheitsexperten aus allen Bereichen zum Gedanken- und Erfahrungsaustausch zusammen. Dort erhalten IT- und Security- Unternehmen, Anwender, Behördenvertreter, Forscher und die Hacker- Community in über 42 Vorträgen und zweitägigen Trainings die Chance, sich über die aktuellen und zukünftigen Sicherheitsthemen auszutauschen. Die Konferenz möchte insbesondere dem weit verbreiteten Vorurteil entgegen wirken, dass Hacker, Studierende sowie Sicherheitsexpertinnen zwangsläufig Kriminelle sind.