Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

idk, after 20 years of experience in the security field, I have seen more than one enterprise printer put to other uses by bad guys :P


Bad guys playing Doom by chance?


As fun as things like that are, AFAIK most of those types of PoC exploits are done using SOHO printers. There are two specific cases I am thinking of, one where a pile of extremely confidential data was captured by pulling documents that had been sent to a printer for printing or faxing; in that case it was an insider who was copying docs they shouldn't have access to. In the other case it was a pretty nifty attack where the attacker was able to pivot using credentials taken from a printer to access other systems.

There are also several publicly available tools that can be used to pop printers, and use them for other bad things, but it's not an area I have spent much time in other than from a blue team/IR perspective. Printers, like alot of other hardware, are usually poorly maintained, but at least patching has mostly gotten easier and most infrastructure scanning tools will report vulnerabilities and weaknesses in them now.


I suspect Monopoly is a better game model.




Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: