Home page logo

pen-test logo Penetration Testing mailing list archives

RE: Printer jobs hijacking
From: "Paul Melson" <pmelson () gmail com>
Date: Mon, 27 Nov 2006 12:50:27 -0500

-----Original Message-----
Subject: Printer jobs hijacking

What would be the approach ? or tools ? (something like a tcpreplay ???)

If you just want to decode print jobs, the PC -> printer payloads should
just be raw print files.  Save the sessions with tcpflow and extract the
payloads to a file.  Then you just need a program that can view the raw
postscript or PCL file.  More on that here:



This List Sponsored by: Cenzic

Need to secure your web apps?
Cenzic Hailstorm finds vulnerabilities fast.
Click the link to buy it, try it or download Hailstorm for FREE.

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]