Тёмный

Nullcon Berlin 2024 | Printer Hacking Adventures By Peter Geissler 

nullcon
Подписаться 11 тыс.
Просмотров 774
50% 1

Abstract
This talk will take a deep dive into what makes the printers in your office tick. Networked printers are an often overlooked entry- and pivot point into (corporate) networks. Under the hood, they run either Linux or proprietary real-time operating systems. How do you get access to the firmware code running on these printers? How do you debug closed and undocumented platforms like this?
We will detail three different exploit chains for various printers:
CANON ImageCLASS - memory corruption exploit(s) leading to a full compromise of the printer.
Lexmark - a chain of logic bugs leading to arbitrary code execution and full compromise of the printer.
These exploit(s) were submitted as part of the annual Pwn2Own competition. We will drill down the various bugs and show how they can be exploited.
Download Presentation: berlin2024.nullcon.net/berlin...
#NetworkSecurity #FirmwareExploits #Pwn2Own #cybersecurity
Know more - nullcon.net/berlin-2024/speak...
-----------------
Follow Nullcon on Facebook: / nullcon
X: / nullcon
LinkedIn: / posts
Website: nullcon.net/

Наука

Опубликовано:

 

7 май 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии    
Далее
Et toi ? Joue-la comme Pavard ! 🤪#shorts
00:11
Просмотров 1,8 млн
Buffer Overflow Hacking Tutorial (Bypass Passwords)
55:39
Exploiting Network Printers
45:09
Просмотров 45 тыс.
Alexander Stifanovs  F4F  Qualy Rome
4:02
Просмотров 1,9 тыс.
Reading Kernel Source Code - Analysis of an Exploit
19:02
How SUDO on Linux was HACKED! // CVE-2021-3156
19:56
Просмотров 199 тыс.
Where to start with exploit development
13:59
Просмотров 13 тыс.
Это спасёт камеру iPhone
0:32
Просмотров 459 тыс.
PA-RISC рабочая станция HP Visualize
41:27