Penetration Testing mailing list archives
RE: Printer jobs hijacking
From: "Paul Melson" <pmelson () gmail com>
Date: Mon, 27 Nov 2006 12:50:27 -0500
-----Original Message----- Subject: Printer jobs hijacking
What would be the approach ? or tools ? (something like a tcpreplay ???)
If you just want to decode print jobs, the PC -> printer payloads should just be raw print files. Save the sessions with tcpflow and extract the payloads to a file. Then you just need a program that can view the raw postscript or PCL file. More on that here: http://www.securityfocus.com/archive/91/409156/30/240/threaded PaulM ------------------------------------------------------------------------ This List Sponsored by: Cenzic Need to secure your web apps? Cenzic Hailstorm finds vulnerabilities fast. Click the link to buy it, try it or download Hailstorm for FREE. http://www.cenzic.com/products_services/download_hailstorm.php?camp=701600000008bOW ------------------------------------------------------------------------
Current thread:
- Printer jobs hijacking Frank Bussink (Nov 24)
- Re: Printer jobs hijacking Martin Mačok (Nov 24)
- RE: Printer jobs hijacking Paul Melson (Nov 27)