2019
DOI: 10.1007/978-3-030-26250-1_21
|View full text |Cite
|
Sign up to set email alerts
|

You Overtrust Your Printer

Abstract: Printers are common devices whose networked use is vastly unsecured, perhaps due to an enrooted assumption that their services are somewhat negligible and, as such, unworthy of protection. This article develops structured arguments and conducts technical experiments in support of a qualitative risk assessment exercise that ultimately undermines that assumption. Three attacks that can be interpreted as postexploitation activity are found and discussed, forming what we term the Printjack family of attacks to pri… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 3 publications
(5 reference statements)
0
6
0
Order By: Relevance
“…A reference use case sees an insider scan their local network for available 9100 ports. We define the Printjack family of attacks against network printers as follows [1]: Printjack 1 attack, zombies for traditional DDoS ( §4.1); Printjack 2 attack, paper DoS ( §4.2); Printjack 3 attack, privacy infringement ( §4.3).…”
Section: Network Printersmentioning
confidence: 99%
See 1 more Smart Citation
“…A reference use case sees an insider scan their local network for available 9100 ports. We define the Printjack family of attacks against network printers as follows [1]: Printjack 1 attack, zombies for traditional DDoS ( §4.1); Printjack 2 attack, paper DoS ( §4.2); Printjack 3 attack, privacy infringement ( §4.3).…”
Section: Network Printersmentioning
confidence: 99%
“…This article is an abridged version of two workshop papers, one on Printjack [1] and one on Phonejack [2]. It adds relevant research questions and their answers, a clear definition of the assumed threat model, an assessment of the attack likelihood from the outside of the network and a revised, fullyjustified taxonomy for possible attack protection measures with respect to the stated threat model.…”
Section: Introductionmentioning
confidence: 99%
“…More precisely, we define a family of three attacks and, following the same style used against printers before [3], we term it the Phonejack family of attacks against VoIP:…”
Section: A Contributionsmentioning
confidence: 99%
“…A fundamental question we raised with printers [3] firmly arises also in this case. Why are phones configured without any security measure at all when we are used to protecting our institutional laptops with a number of such measures, such as authentication, just to begin with?…”
Section: Evaluations and Conclusionmentioning
confidence: 99%
See 1 more Smart Citation