
Printer Hacking 101
In this challenge we will be looking at some basic printer vulnerabilities using PRET and getting access to unsecured printers. The room can be found here. A cheat sheet for use with PRET can be found here.
A video walkthrough of this room can be found here.
Table of Contents
Unit 2: IPP Port
- What port does IPP run on?
This answer can be found with a quick Google search.
Click for answer
631
Unit 3: Targeting & Exploitation
- How would a simple printer TCP DoS attack look as a one-line command?
For this question we can look at the cheat sheet provided. Here we look for any commands related to TCP.
Click for answer
while true; do nc printer 9100; done
- Review the cheat sheet provided in the task reading above. What attack are printers often vulnerable to which involves sending more and more information until a pre-allocated buffer size is surpassed?
This answer can also be found in the attached cheat sheet whilst looking for anything related to buffer.
Click for answer
Buffer Overflow
- Connect to the printer per the instructions above. Where's the Fox_Printer located?
Lets navigate to the appropriate page 10.10.7.6:631. Here we get a home page for the CUPS server. Navigating to the printers tab, we get a list of available printers.

Click for answer
Skidy's basement
- What is the size of a test sheet?
For this we can click on the printer in question and under the maintenance dropdown select print test page.


Now we can find more information for this job on the jobs page.

Click for answer
1k
Extra I tried logging into the printer by brute-forcing the password. Unfortunately, Hydra kept crashing (the try rate was very slow).

So I was unable to get the password. But several other walkthroughs listed the password with which I could log in. Have yet to try out things to do after that.
Click for answer
password123