Exploiting Network Printers

Exploiting Network Printers

IEEE Symposium on Security and Privacy via YouTube Direct link

Conclusions

13 of 13

13 of 13

Conclusions

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Exploiting Network Printers

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Why printers?
  3. 3 How to print?
  4. 4 Overview
  5. 5 Attacker model: Physical access
  6. 6 Attacker model: Web attacker
  7. 7 Denial of service
  8. 8 Protection bypass
  9. 9 Print job manipulation
  10. 10 Evaluation results
  11. 11 Printer Exploitation Toolkit (PRET)
  12. 12 PostScript in the web?
  13. 13 Conclusions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.