Do you use Canon printers? Canon PIXMA hacked

What a printer has a job Canon PIXMA with the Doom game? 1993, the Doom shooter was a fairly pioneering game. 2014, the same game is used by ethical hackers to prove that there are vulnerabilities in various online devices.

During his speech at the 44Con conference in London, Michael Jordon from Context Information Security demonstrated that he could easily break the printer Canon PIXMA - popular for homes and small businesses - making him run Doom.

Canon PIXMA Canon PIXMA Canon PIXMAHacking on it was no small feat as Jordon discovered that the device has a web which does not need a username or password.

The web interface is used by the printer to show the ink level and its status s. But it soon became apparent that a hacker could use it to update the machine's firmware – the code that is essentially the heart and soul of the printer.

Continuing he could change the printer settings to make the machine prompt από έναν κακόβουλο διακομιστή αντί το επίσημο of Canon.

Jordon took advantage of what the company described as "awesome" encryption that protects the firmware to add some tweaks to the code, allowing it to control the machine remotely.

A malicious hacker could find out what documents the printer was printing, or start running commands to use system resources. If the machine belonged to a business, it could have access to its network.

Jordon the Doom game at the hackers conference, 44Con to make his presentation more interesting. Graphics may have been a bit weird, but the game runs without a doubt on Canon PIXMA.

"If you can run Doom on a printer, you can do a lot more nasty things," Jordon told the Guardian. "In a corporate environment, who suspects printers?"

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).