SCF Advanced Search

  • Total Posts: 40509
  • Total Topics: 14420
  • Online Today: 571
  • Online Ever: 51419
  • (01. January 2010., 10:27:49)

Author Topic: How To Hack Office Multifunction Printer?! (Toshiba, HP, Cannon, Lexmark, Xerox)  (Read 12399 times)

0 Members and 3 Guests are viewing this topic.


  • SCF Administrator
  • *****
  • Posts: 7528
  • KARMA: 322
  • Gender: Male
  • Whatever doesn't kill us makes us stronger.
    • - Samker's Computer Forum

Cybercriminals are always looking for easy ways to break into your network, whether at work or at home. In a talk at this summer's DefCon 19 conference, security researcher Deral Heiland demonstrated various ways to compromise Internet-ready consumer-grade multifunction printers:
These include printers that can scan to a file, scan to email, and fax documents, and the vulnerabilities he found are similar across all vendors.

If you haven't taken the time to access the administration control panel webpage for your printer and change its default passwords, do so now. Unfortunately, that will only slow down a very persistent criminal.

For example, Heiland demonstrated that if you did change the default Toshiba printer password from 123456 to something unique, a criminal can simply add an extra backslash to the URL to gain administrator access to the device. And he said that if you copy the URL from the HP OfficeJet printer login page and then add "page=" to the end when you paste it back in, this will bypass any new passwords that have been added to those printers. This could let a hacker access sensitive documents that have been recently scanned or printed.

On some of the printer administration webpages, basic coding flaws can also expose sensitive information such as passwords. With the HP Officejet multifunction page, Heiland said he was able to right-click the page in Firefox in order to see the plaintext of the password normally hidden by black dots. The same, he said, was true on the Toshiba models he'd tested.

For office printers, internal address books are often used to route faxes and scanned documents to the individual workstations. Heiland found that, in order to access its address book, Cannon requires an attacker to first have a cookie--which, if they are using a Google search to find the administration webpage over the Internet, they would not necessarily have. But if you click to the Home page tab, Heiland said your computer will receive a cookie that allows you to retrieve the plaintext address book from the printer.

Heiland added that Cannon did fix this vulnerability on most of its Image Runner line, but he found two models--IR3580 and IR4080--that still allowed for this particular hack to work.

Another attack takes advantage of the backup feature (or "cloning", as Xerox calls it) on the printer. In the case of Lexmark and Xerox printers, he said the backups exported the account passwords in plain text.

In yet another attack. he was able to redirect the test pages that most printers spit out by intercepting the Lightweight Directory Access Protocol (LDAP) in a sort of man-in-the-middle attack. Here he attacked Sharp and Ricoh printers, redirecting their test pages to him, and setting him up as a valid user.

At the end of his talk, Heiland announced the release of a new penetration testing tool called PRAEDA: , which he said is Latin for "to plunder, spoils of war, booty". The tool, in the right hands, can help IT administrators discover multifunction printer vulnerabilities on their network, with modules for each of the vendors cited above. The release of the tool will also undoubtedly put pressure on the printer manufacturers to patch or fix these multifunction printer problems entirely.


Samker's Computer Forum -


  • Guest
How to hack office multifunction printer? This is really difficult work which i am trying to done, But to it not difficult when i choose the hack means i have to do it and share it with those who are here in my hacking process.


  • SCF Member
  • **
  • Posts: 64
  • KARMA: 5
  • Gender: Male
It’s essential with such a high level of risk exposure that companies take as much care to protect their Office Multifunction Printers (MFPs) and printing operations as they would over their day-to-day Personal Computer (PC) or computer server security.

The list which follows outlines the core layers of defense across the main areas of Office Multifunction Printer (MFP) security – data, document, network and authentication.

1. Hard Disk Drive Encryption
2. Hard Disk Drive Data Erase
3. Secure Watermarks
4. Secure Print

I hope this helps!


  • Guest
Why not settling on games that is fun and at the same time your earning. Well it'll make suspense because of the game as well but dude just try it and it gave me hope while pandemic is real rn.   Boost Your Odds By Using Baccarat Formula

Samker's Computer Forum -


With Quick-Reply you can write a post when viewing a topic without loading a new page. You can still use bulletin board code and smileys as you would in a normal post.

Name: Email:
Type the letters shown in the picture
Listen to the letters / Request another image
Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters)

Enter your email address to receive daily email with ' - Samker's Computer Forum' newest content:

Terms of Use | Privacy Policy | Advertising