4. Methods on
How Printers
Get Hacked ?
Open Ports
Weak Credentials
Outdated SoftwareVersion
Open Portal ( No Login )
5. How To
Secure Your
Printer ?
Close any Open Port , Many Printers use FTP , STMP , andTelnet ;
these ports are widely used on networks for the ease of usage.These
ports can be easily exploited by attackers.
ChangeYour Default Credentials ,most of the printers come with a
default password and some don't , default passwords can be easily
found online , so change your default password and make sure it is a
long password.
ChangeYour Printers IPAddress , most of the printers are configured
with a public ip address , make sure to switch your public address to
an internal address and at some point configure your printer to be
displayed and found on a certain subnet in your network.
ApplyThe Latest Software Update for your printer , I can't stress
enough on how this is important.
6. What are The
Tools Used To
Exploit Printers
?
These are the most commonTools usedby Black Hat Hackers , I
really recommend knowing how these tools work not just use them ,
these are powerful tools that are made by highly educated people
don't just use them without understanding them.
PRET,PRET is an Exploitation FrameworkThat is built for exploiting
printers
Shodan,Shodan is a search engine that lets the user find specific types
of computers connected to the internet using a variety of filters.
Some have also described it as a search engine of service banners,
which are metadata that the server sends back to the client.
7. Common Exploitation Methods
Port 9100 , this is the default
port for printers it is used to
transfer raw data
Public Exploits, CVE-2016-
3238 and MS16-087 , this is a
vulnerability that allows an
attacker to infect and spread
malware on a network. More
Details here: Demo
Searching for printers in
shodan
9. Practical Information
• As you can see from the previous image , just by doing a simple shodan search you can
see the vulnerable printers , and from there the hackers take the IP addresses shown
and exploit the printer using PRET , manually , or any other technique.This is a simple
method of finding exploitable printers. I Am not going to show the usage of PRET
because there is many articles/videos on it.
12. Thank You
• This presentation was kindly made by System Exploited ( Hussein Muhaisen )
• Check Me Out :
• https://twitter.com/ExploitedSystem
• https://youtube.com/SystemExploited
• https://husse1n.com
• https://zsecurity.com/author/muhaisenhussein