Exploiting Network Printers

Exploiting Network Printers

IEEE Symposium on Security and Privacy via YouTube Direct link

Evaluation results

10 of 13

10 of 13

Evaluation results

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Exploiting Network Printers

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Why printers?
  3. 3 How to print?
  4. 4 Overview
  5. 5 Attacker model: Physical access
  6. 6 Attacker model: Web attacker
  7. 7 Denial of service
  8. 8 Protection bypass
  9. 9 Print job manipulation
  10. 10 Evaluation results
  11. 11 Printer Exploitation Toolkit (PRET)
  12. 12 PostScript in the web?
  13. 13 Conclusions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.