TL;DR: In the scope of academic research on printer security, various vulnerabilities in network printers and MFPs have been discovered. This is advisory 5 of 6 of the `Hacking Printers' series. Each advisory discusses multiple issues of the same category. This post is about resetting a printer to factory defaults through ordinary print jobs, therefore bypassing all protection mechanisms like user-set passwords. The attack can be performed by anyone who can print, for example through USB or network. It can even be carried out by a malicious website, using cross-site printing techniques (see http://ift.tt/2jKBog0). ========================[ Factory Defaults ]==========================
Source: Gmail -> IFTTT-> Blogger
No comments:
Post a Comment