Do you use Canon printers? Canon PIXMA hacked

What a printer has a job Canon PIXMA with the game Doom? In 1993, the shooter Doom was a pretty groundbreaking game. In 2014, the same game is used by ethical hackers to prove their existence various online .

During his speech at 44Con in London, Michael Jordon from Context Information Security proved that he could hack the printer very easily Canon PIXMA - popular for homes and small businesses - making him run Doom.

Canon PIXMA Canon PIXMA Canon PIXMAHacking on the machine was not insignificant, as Jordon discovered that the device has a web interface that does not need a username or password.

The web interface is used by the printer to indicate the ink level and print status. But it soon became apparent that a hacker could use it to update the machine firmware - the code that is essentially the heart and soul of the printer.

Continuing it could change the printer's settings to make the machine request updates from a malicious server instead of its official channel Canon.

Jordon took advantage of what the company described as "awesome" encryption that protects the firmware to add some tweaks to the code, allowing it to control the machine remotely.

A malicious hacker could find out what documents the printer was printing, or start running commands to use system resources. If the machine belonged to a business, it could have access to its network.

Jordon the Doom game at the hackers conference, 44Con to make his presentation more interesting. Graphics may have been a bit weird, but the game runs without a doubt on Canon PIXMA.

"If you can run Doom on a printer, you can do a lot more nasty stuff," Jordon told the . “In a corporate environment, who suspects printers?”

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).