[33601] in bugtraq

home help back first fref pref prev next nref lref last post

Re: vulnerabilities of postscript printers

daemon@ATHENA.MIT.EDU (Nicolas Gregoire)
Wed Feb 11 02:22:05 2004

From: Nicolas Gregoire <ngregoire@exaprobe.com>
To: bugtraq@securityfocus.com
In-Reply-To: <200401300115.15244.dr@kyx.net>
Content-Type: text/plain; charset=ISO-8859-1
Message-Id: <1076366324.500.66.camel@bobby.exaprobe.com>
Mime-Version: 1.0
Date: Tue, 10 Feb 2004 09:11:42 +0100
Content-Transfer-Encoding: 8bit

On Fri, 2004-01-30 at 10:15, Dragos Ruiu wrote:

> Network attached printers are good portscanners in practice :-).

And their poor IP stacks are easy to use for Idle scans, allowing to
hide the real source of packets.

And you could too keep your sploits on their hard-drive, which could be
the only one of the network without an AV monitoring it.

-- 
Nicolas Gregoire ----- Consultant en Sécurité des Systèmes d'Information
ngregoire@exaprobe.com ------[ ExaProbe ]------ http://www.exaprobe.com/
PGP KeyID:CA61B44F  FingerPrint:1CC647FF1A55664BA2D2AFDACA6A21DACA61B44F


home help back first fref pref prev next nref lref last post