Skip to content

Printer Hacking 101 Banner

Printer Hacking 101

Printer Hacking 101

In this challenge we will be looking at some basic printer vulnerabilities using PRET and getting access to unsecured printers. The room can be found here. A cheat sheet for use with PRET can be found here.

A video walkthrough of this room can be found here.

Table of Contents

Unit 2: IPP Port

  1. What port does IPP run on?

This answer can be found with a quick Google search.

Click for answer631

Unit 3: Targeting & Exploitation

  1. How would a simple printer TCP DoS attack look as a one-line command?

For this question we can look at the cheat sheet provided. Here we look for any commands related to TCP.

Click for answerwhile true; do nc printer 9100; done

  1. Review the cheat sheet provided in the task reading above. What attack are printers often vulnerable to which involves sending more and more information until a pre-allocated buffer size is surpassed?

This answer can also be found in the attached cheat sheet whilst looking for anything related to buffer.

Click for answerBuffer Overflow

  1. Connect to the printer per the instructions above. Where's the Fox_Printer located?

Lets navigate to the appropriate page 10.10.7.6:631. Here we get a home page for the CUPS server. Navigating to the printers tab, we get a list of available printers.

Website Printers

Click for answerSkidy's basement

  1. What is the size of a test sheet?

For this we can click on the printer in question and under the maintenance dropdown select print test page.

Website Printer

Test Page

Now we can find more information for this job on the jobs page.

Test Job

Click for answer1k

Extra I tried logging into the printer by brute-forcing the password. Unfortunately, Hydra kept crashing (the try rate was very slow).

Hydra Attempt

So I was unable to get the password. But several other walkthroughs listed the password with which I could log in. Have yet to try out things to do after that.

Click for answerpassword123