by skattyadz on 1/25/13, 4:17 PM with 141 comments
by joering2 on 1/25/13, 5:21 PM
1. write a script to scrap google links to HP admin panel
2. filter out the IPs that are from US (given you want to work on US market)
3. assemble the list of printer types and current toner levels.
4. write a script that will print to each of those printers a one single page, stating your company "Cheapo Suppliers Inc" was notified that "your printer is low on toner. Call xxxxxx to re-fill. Lowest prices quaranteed within one day delivery!". You can add link to your shop page that already redirects user to specific type of printer they have, some type of one-click order (based on which toners are low).
5. daily rinse repeat.
6. sell your business to HP (at least try to).
by mrj on 1/25/13, 4:43 PM
by modernerd on 1/25/13, 5:40 PM
by josh2600 on 1/25/13, 5:27 PM
In case you guys haven't seen it, Ang Cui is the guy who did the Cisco hack last month and he's also the guy with the coolest resume on the planet.
He actually found a way to compromise printers during the print process, so by printing his resume, he pwns your printer. This seems like a bull in the china shop situation for that code.
by bintery on 1/25/13, 5:24 PM
Maybe more disturbing is that as these things are decommissioned they are just 'junked'. Meaning sent over seas as is to be 'disposed' - anything ever copied, scanned, or sent on that thing is in there somewhere and some foreign nation is in control of MFDs that were in hospitals, law firms, architect/contractor office, police stations, and on and on and on.
The holes have been largely fixed through encryption and other techniques but only very recently - which I've been able to work around myself with forensic tools. I won't provide the link here, but if you google around you can find discussion on this topic pretty easily.
by achillean on 1/25/13, 5:53 PM
http://www.shodanhq.com/search?q=hp+jetdirect http://www.shodanhq.com/search?q=laserjet http://www.shodanhq.com/search?q=HP-ChaiSOE
by kabdib on 1/25/13, 5:48 PM
I enumerated every printer on campus (about 900 of them at the time, I think), and came /this close/ to printing a snarky page -- a fake version of the "Five Star News" internal company news -- on each one of them. Decided not to; probably a good career move that I resisted that urge.
by VMG on 1/25/13, 4:53 PM
by cs702 on 1/25/13, 5:24 PM
Bruce Schneier's personal WiFi network at home is fully open, because -- in his own words: "If I configure my computer to be secure regardless of the network it's on, then it simply doesn't matter. And if my computer isn't secure on a public network, securing my own network isn't going to reduce my risk very much."[2]
I'm waiting for the great network printer security apocalypse...
--
I ran a quick nmap command (nmap -T4 -A -v -PE [IP address]) on a few of the many printers indexed by Google, and here's a typical result, showing tons of open ports and passwordless login options (I've deleted the hostname and IP address to protect the innocent):
Starting Nmap 5.21 ( http://nmap.org ) at 2013-01-25 12:15 EST
NSE: Loaded 36 scripts for scanning.
Initiating Ping Scan at 12:15
Scanning XXX.XXX.XXX.XXX [1 port]
Completed Ping Scan at 12:15, 0.10s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 12:15
Completed Parallel DNS resolution of 1 host. at 12:15, 0.14s elapsed
Initiating Connect Scan at 12:15
Scanning [HOSTNAME] (XXX.XXX.XXX.XXX) [1000 ports]
Discovered open port 23/tcp on XXX.XXX.XXX.XXX
Discovered open port 21/tcp on XXX.XXX.XXX.XXX
Discovered open port 443/tcp on XXX.XXX.XXX.XXX
Discovered open port 80/tcp on XXX.XXX.XXX.XXX
Increasing send delay for XXX.XXX.XXX.XXX from 0 to 5 due to max_successful_tryno increase to 5
Increasing send delay for XXX.XXX.XXX.XXX from 5 to 10 due to max_successful_tryno increase to 6
Warning: XXX.XXX.XXX.XXX giving up on port because retransmission cap hit (6).
Discovered open port 14000/tcp on XXX.XXX.XXX.XXX
Discovered open port 631/tcp on XXX.XXX.XXX.XXX
Discovered open port 280/tcp on XXX.XXX.XXX.XXX
Completed Connect Scan at 12:15, 37.26s elapsed (1000 total ports)
Initiating Service scan at 12:15
Scanning 7 services on [HOSTNAME] (XXX.XXX.XXX.XXX)
Completed Service scan at 12:16, 13.09s elapsed (7 services on 1 host)
NSE: Script scanning XXX.XXX.XXX.XXX.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 12:16
Completed NSE at 12:16, 3.57s elapsed
NSE: Script Scanning completed.
Nmap scan report for [HOSTNAME] (XXX.XXX.XXX.XXX)
Host is up (0.11s latency).
Not shown: 978 closed ports
PORT STATE SERVICE VERSION
21/tcp open ftp HP LaserJet P4014 printer ftpd
|_ftp-anon: Anonymous FTP login allowed
23/tcp open telnet HP JetDirect telnetd
25/tcp filtered smtp
80/tcp open http HP-ChaiSOE 1.0 (HP LaserJet http config)
| html-title: hp LaserJet 9050
|_Requested resource was http://XXX.XXX.XXX.XXX/hp/device/this.LCDispatcher
111/tcp filtered rpcbind
135/tcp filtered msrpc
139/tcp filtered netbios-ssn
280/tcp open http HP-ChaiSOE 1.0 (HP LaserJet http config)
| html-title: hp LaserJet 9050
|_Requested resource was http://XXX.XXX.XXX.XXX/hp/device/this.LCDispatcher
443/tcp open ssl/http HP-ChaiSOE 1.0 (HP LaserJet http config)
| html-title: hp LaserJet 9050
|_Requested resource was http://XXX.XXX.XXX.XXX/hp/device/this.LCDispatcher
445/tcp filtered microsoft-ds
515/tcp filtered printer
631/tcp open http HP-ChaiSOE 1.0 (HP LaserJet http config)
| html-title: hp LaserJet 9050
|_Requested resource was http://XXX.XXX.XXX.XXX/hp/device/this.LCDispatcher
1433/tcp filtered ms-sql-s
1720/tcp filtered H.323/Q.931
3168/tcp filtered unknown
4550/tcp filtered unknown
6000/tcp filtered X11
6112/tcp filtered dtspc
8654/tcp filtered unknown
9100/tcp filtered jetdirect
14000/tcp open tcpwrapped
19315/tcp filtered unknown
Service Info: Device: printer
--[1] http://news.ycombinator.com/item?id=4412714
[2] http://www.schneier.com/blog/archives/2008/01/my_open_wirele...
by KwanEsq on 1/25/13, 5:27 PM
by mentat on 1/25/13, 6:54 PM
by feefie on 1/25/13, 6:28 PM
by jhdevos on 1/25/13, 4:41 PM
by meaty on 1/25/13, 7:53 PM
Even better, a lot of people in the UK have Thomson routers which have an easily calculable WPA default password. Most of these also have smart tvs these days too which will allow anything to be pushed to them.
by penguat on 1/25/13, 4:41 PM
by smallegan on 1/25/13, 5:42 PM
by bitwize on 1/25/13, 7:21 PM
What are you, stoned or stupid?
by tmosleyIII on 1/25/13, 7:30 PM
by kunai on 1/26/13, 12:00 AM
Am I the only one with this problem, or did Google really not index "thousands of publicly accessible HP printers"?
by GBond on 1/25/13, 6:30 PM
by hn-miw-i on 1/26/13, 5:30 AM
Some work was done at Columbia University with developing trojanised firmware, i recall a firmware that could transmit CC# over tcp when it saw then in the print stream.
Extreme care must be taken if connecting printers to the Internet. It's at best a horrible idea and I'd say that most of these are unknown to their owners. Hopefully this gets some MSM coverage and people address the connected printer problem forever. (not likely)
by jagermo on 1/25/13, 5:44 PM
by aw3c2 on 1/25/13, 4:54 PM
by daralthus on 1/25/13, 8:05 PM
by rbchv on 1/25/13, 6:19 PM
by FollowSteph3 on 1/25/13, 5:30 PM
by tlrobinson on 1/25/13, 5:56 PM
by sandycheeks on 1/25/13, 8:47 PM
I wonder if any of those are honeypots. It may be interesting to see if any visitors do something clever or unexpected.
by afita on 1/25/13, 9:06 PM
by fnordfnordfnord on 1/26/13, 6:18 AM
by deadairspace on 1/26/13, 2:56 AM
by TranceMan on 1/25/13, 7:24 PM
My printer got slashdotted :(
> Eh?
by hippich on 1/25/13, 7:42 PM
by kristopolous on 1/25/13, 6:50 PM
by humanspecies on 1/25/13, 6:09 PM