Printer Error Message Hack
Contents |
N Mod Updates Access any Printer, @pjl rdymsg display Anywhere How to: DIY Cable Management on a Budget Create a fake fatal error message to
Hp Pjl Commands
Horrify your Friends Transform your PC into a TiVo Name Email Comment: Subscribe to HacknMod Updates Subscribe to Hack N Mod via RSS Follow @HacknMod on Twitter Send us Projects, Earn telnet Cash Or, subscribe via email: Airsoft & Gun Apple Arduino Audio Car Case Mod Cell Phone Circuitry DIY Free Energy General Internet Laser Leds & Light Linux NES & Atari Psp, Ps2, and Ps3 Robots USB Projects Wii Windows Xbox 360 Random 30 Days All Time About Us About Contact Us Advertise Send us Hacks Write for Us Get Daily Updates Newsletter Free HacknMod Gear Exclusive Discounts Behind the Scenes HacknMod Store Discounts E-mail: HacknMod Store Most Popular | Led Projects | Hack N Mod Store | Submit Hacks HacknMod.com © 2013
but online attacks that have physical-world consequences are fundamentally a different sort of threat. I suspect we'll learn more about what's actually possible in the coming weeks. HP has issued a rebuttal. Tags: hacking, hardware, HP, printers, zero-day Posted on putty December 2, 2011 at 1:17 PM • 17 Comments Comments imnobody • December 2, 2011 1:58 PM lp0 on fire ... no really Alex Wilson • December 2, 2011 2:37 PM That reminds me that I haven't updated any printers at work with the status "Can haz moar tonar?" in a while. Steve C • December 2, 2011 3:14 PM This particular exploit may be hype-like, however one must realize that many of these printers are http://hacknmod.com/hack/hack-a-printer-display/ computers within themselves and they are often running many open services including telnet, www, ftp, etc. I have found printers without so much as a password, and I could change anything I wanted, including starting other services or installing drivers. In short, if you have an open path to be able to exploit these services then you can get a foothold inside the security perimeter, and thus a stepping stone to launch attacks against other machines of https://www.schneier.com/blog/archives/2011/12/hacking_printer.html more significance. tzine3 • December 2, 2011 3:27 PM Yes a prudent person should have their printer behind a firewall and the default password changed. Every print I can remember has a thermal shutdown switch to prevent a malfunction. The researcher was unable to set a printer on fire and is spreading FUD on that subject. kashmarek • December 2, 2011 3:28 PM At this web page to the address placed at the bottom, http://www.hp.com/hpinfo/newsroom/press/2011/... I sent this reply to HP: ------------------------------------------------ I read with interest the web page: http://www.hp.com/hpinfo/newsroom/press/2011/... Ostensibly, you completely ignored earlier HP marketing campaigns for selling "network enabled" printers, so they could be use for "print anywhere" or "print from anywhere" activity. Tsk, tsk. Making a printer available on the public network to be used for "print anywhere" or "print from anywhere", has got to be the worst product idea ever to come out of your company. This invites attack, or most certainly use of the device as a potential target for malware (a printer available on the public network is effectively a router which allows access to the local network, when compromised). If HP is no longer providing this feature, then tell everyone. If you know how to disable this feature, then TELL everyone. If HP was using this feature for their own benefit, then get out of the business. MT • Dece
RSS Your IP Podcasts Hoosier Hackers Newscat Links Contact Forums Workout Nutrition Supplements Humor Irongeek Campuses Fed Watch Books Store About Follow @irongeek_adc Search Irongeek.com: Affiliates: Help Irongeek.com pay for http://www.irongeek.com/i.php?page=security/networkprinterhacking bandwidth and research equipment: Hacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins) Hacking Network Printers (Mostly HP JetDirects, but a little info on the Ricoh Savins) By Adrian "Irongeek" Crenshaw Hack a printer you say, what kind of toner have you been smoking, Irongeek? Well, I'm here to tell you, there's more that can be hp printer done with a printer to compromise network security than one might realize. In the olden days a printer may not have been much of a concern other than the threat from folks dumpster diving for hard copies of the documents that were printed from it, but many modern printers come network aware with embedded Operating Systems, storage and full IP stacks. This article will hp printer display attempt to point out some of the more interesting things that can be done with a network based printer to make it reveal information about its users, owners and the network it's part of. Some of this article may seem a little Black-hat as it concentrates more on the breaking-in than the keeping-out. However I feel this information will be useful to system administrators and auditors so that they know what sorts of things to look out for when it comes to network printers. If you want more advice on how to lock down your network printer visit your vendors web site. A guide from HP is linked at the bottom of this article for your convenience. If nothing else, this article may get you thinking in the right direction. For my tests I will mostly be using a Hewlett-Packard LaserJet 4100 MFP (Fax/Printer/Copier/Scanner), an HP JetDirect 170x and a HP JetDirect 300X (J3263A) but I will also touch a bit on the Ricoh Savin series of printers lest you think HPs are the only network printers with security problems. Much of this article will read l