Home page logo
/

pen-test logo Penetration Testing mailing list archives

RE: Printer jobs hijacking
From: "Paul Melson" <pmelson () gmail com>
Date: Mon, 27 Nov 2006 12:50:27 -0500

-----Original Message-----
Subject: Printer jobs hijacking

What would be the approach ? or tools ? (something like a tcpreplay ???)

If you just want to decode print jobs, the PC -> printer payloads should
just be raw print files.  Save the sessions with tcpflow and extract the
payloads to a file.  Then you just need a program that can view the raw
postscript or PCL file.  More on that here:

http://www.securityfocus.com/archive/91/409156/30/240/threaded

PaulM



------------------------------------------------------------------------
This List Sponsored by: Cenzic

Need to secure your web apps?
Cenzic Hailstorm finds vulnerabilities fast.
Click the link to buy it, try it or download Hailstorm for FREE.
http://www.cenzic.com/products_services/download_hailstorm.php?camp=701600000008bOW
------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]