Printer to PWND: Leveraging Multifunction Printers During Penetration Testing

ShmooCon VII - 2011

Presented by: Pete Arzamendi (Bokojan), Deral Heiland (PercX)
Date: Saturday January 29, 2011
Time: 10:00 - 11:00
Location: Break It room
Track: Break It!

In this presentation we go beyond the common printer issues and focus on harvesting data from multifunction printer (MFP) that can be leveraged to gain access to other core network systems. By taking advantage of poor printer security and vulnerabilities during penetration testing we are able to harvest a wealth of information from MFP devices including usernames, email addresses, authentication information including SMB, Email, LDAP passwords. Leveraging this information we have successful gained administrative access into core systems including email servers, file servers and Active directory domains on multiple occasions. We will also explore MFP device vulnerabilities including authentication bypass, information leakage flaws, and XSS flaws. Tying this altogether we will discuss the development of an automated process for harvesting the information from MFP devices with the beta release of our new tool ‘PRAEDA’.

Deral Heiland

Deral Heiland: CISSP, Responsible for security assessment and consulting for corporations and government agencies. In addition, Deral is co-founder and President of Ohio Information Security a 501c3. Deral has worked in IT for 18+ years, 8 of those years in security. Member of the Foofus.Net team.

Pete Arzamendi

Pete Arzamendi: Former packet monkey, has been doing security for five-ish years. Worked with small, and medium businesses, local and state authorities on computer forensic cases and security assessments. Hobbies include malware analysis, vulnerably research, and shooting things. Wishes he could grow a Fu Manchu like Deral. A member of the Foofus.Net team.


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats