Explore a fascinating conference talk from the 38th Chaos Communication Congress (38C3) that delves into exploiting printer security vulnerabilities through fax interfaces. Learn how researchers Rick de Jager and Carlo Meijer discovered and leveraged a printer bug at Pwn2Own Ireland to achieve remote code execution through an often-overlooked fax feature. Discover the surprising relevance of this vintage technology still used in municipalities, banks, and courts, while witnessing live demonstrations including running Doom on compromised devices. Gain technical insights into printer security exploits while enjoying a blend of serious security research and playful demonstrations that challenge conventional thinking about outdated technology. Through practical examples and demonstrations, understand how seemingly obsolete features can create modern security vulnerabilities, making this talk relevant for security professionals, tech enthusiasts, and anyone interested in unconventional approaches to system exploitation.
Dialing into the Past: Remote Code Execution via Fax Machine Security Vulnerabilities
media.ccc.de via YouTube
Overview
Syllabus
38C3 fra - Dialing into the Past: RCE via the Fax Machine – Because Why Not?
Taught by
media.ccc.de