www.Hacking-Romania.com
Hacking, gaby hacker team, programe hack, radmin hack, hi5 hack, hack the west, hacking romania, hacking stuff, hacking tools, 1 hack, 1st hacks, 2 hack, 2 hacks, 3 hack, 3 hacks, 3000 hack, 3004 hack, 4 hack, 4 hacks, 55 hack, 6 hack, 6 hacks, 7 hack, 7 hacks, 9 hack, 9dragons hack, a hack, adventure quest hack, aim hack, alz hack, and hacks, best hack, blue hack, bots hack, bots hacks, buy hack, cabal online hack, chaos hacks, cheat engine hack, cheat hack, cheats and hacks, cheats hacks, city hack, club hack, combo hack, conquer hacks, conquer online hack, conquer online hacks, conquer speed hack, conquiztador hack, counter strike 1.6 hack, damage hack, de hack, download hack, download hack for, dragonfable hack, dragonfable hacks, drakkarious hack, exp hack, flyff hack, free hack, free hacks, game hack, game hacks, garena exp hack, gladiatus hack, gm hack, gold hack, gunz hack, hack, hack 5, hack a pc, hack a site, hack a website, hack blog, hack conquer, hack counter strike, hack crack, hack cs, hack cs 1.6, hack dvd, hack email, hack forum, hack hunter, hack id, hack info, hack it, hack mess, hack muonline, hack net, hack password, hack passwords, hack pc, hack pdf, hack programs, hack site, hack sites, hack soft, hack software, hack team, hack the game, hack this, hack website, hack windows xp, hack world, hack xp, hacked, hacking, hacking game, hacking programs, hacking software, hacking tutorials, hacks, how hack, how to hack, icon hack, last chaos hack, last chaos hacks, life hack, lineage 2 hack, lineage 2 hacks, linux hack, lvl hack, maplestory hacks, mobile hack, multi hack 3.0, mybrute hack, naruto arena hack, naruto arena hacks, one hit kill hack, online hacks, perfect world hacks, pool hack, programe hack, resolution hack, resource hack, roll hack, royal hack, silkroad hack, source hack, speed hack, speed hacks, super hack, the west hack, warrock hack, warrock hacks, web hack, xpango hack, lockerz forum
Lista Forumurilor Pe Tematici
www.Hacking-Romania.com | Reguli | Inregistrare | Login

POZE WWW.HACKING-ROMANIA.COM

Nu sunteti logat.
Nou pe simpatie:
Alexanndra1994 Profile
Femeie
19 ani
Bucuresti
cauta Barbat
23 - 42 ani
www.Hacking-Romania.com / Tutoriale Hack EN / hack functional printers  
Autor
Mesaj Pagini: 1
Storm192
MEMBRU ACTIV

Din: Alba-Iulia
Inregistrat: acum 16 ani
Postari: 244
As more companies are deploying the multifunctional copier/printer/fax/ftp/email machines, they are leaving themselves open to attack.

General multi-functional security issues…

One of the issues that spans most of these types of machines across the manufacturers is that the audit trails are almost non-existent. In other words, you can ftp or email any document you want across the Internet (to a competitor or other evil-intentioned folk) without a full audit trail. Most of the machines will provide the ftp site or email address that the message was sent to, but the sender is not identified. A couple of manufacturers allow you to assign everyone a user ID code (usually 3 or 4 digits) that you have to enter to send anything, but I haven't seen this implemented at any of the companies I've visited.




So what? Folks have been faxing things out without an audit trail for years with a regular fax machine. True, but that the fact that something is generally accepted doesn't mean that it's a good security practice (people successfully speed, run red lights, do dope, and refuse to apply security patches all the time).

Of course, today you can fax out from the privacy of your desk, but most of the turnkey systems today will save a copy of all faxes for later review and provide a good audit trail. Faxing from the multi-functional provides essentially none, even when using most of the fax clients (usually a web browser client) that come with the multi-functionals.

Furthermore, most multi-functionals allow you to use their ftp and email clients from your desk (no standing at the machine while that lanky security admin watches). Zip, it's gone!

Anyone can view the network configuration parameters (IP address, name of email server, etc.). This is also true of most printing devices (HP printers, for example). This can be locked by configuring an administrative password on the unit console, but all users will still be able to see the network configuration via the web browser.

Also, the folks that connect these babes to the network don't usually


bother changing the password that allows admin access to the device via the web browser, ftp, and telnet (what the heck is telnet? the secretary will ask). Of course, with admin access you can then have fun changing the IP addresses, subnet mask, or gateway of the printer to disable it; or better, if the ftp or SMTP options aren't configured, you can configure them and have your very own pipe out of the company (but your company's firewall is configured to block any ftp or SMTP traffic not coming from the appropriate devices, so that won't work anyway, right?)

Another issue is the large disk drives these machines have, where many of the printouts, scans, and email and ftp files are stored. It's just another place for the feds to check for incriminating evidence about your monopolistic compromises. Or in some cases, if you can ftp to the machine, those files are all YOURS!

Specific vulnerabilities…

While several of these types of machines are vulnerable (regardless of whether you change the admin password and require user ID codes), the Imagistics ) DL370 is especially poorly developed. Other Imagistics machines in this line use the same “scan engine” (as the manufacturers like to call them) and are probably vulnerable, but I have only tested the DL370. I heard that Imagistics stopped using this scan engine due to all the security issues, supposedly made by Minolta, for some other engine (not sure whose). I have searched the Internet and have found nothing related to this specific device, so I believe I am the first to discover and/or post this information.

Regarding the Imagistics DL370…

1. This device has three separate administrative accounts and passwords: one for the unit console, one for the web browser administrative functions, and one for telnet access. The unit console's account/password is not enabled by default; the web browser and telnet accounts/passwords are enabled by default. The default account/password for all 3 services on the machine I examined was admn/admn, but I believe the vendor changes this before install.

2. Administrative functions (such as changing device settings or setting up email addresses, FTP sites, and fax numbers) require an administrative password to be entered. Once entered, the password is stored in the URL in clear text (even after closing the browser and logging off the PC).

To see the password, log in with the admin password (or get the PC used by the administrator of the device), and then backspace over the last character in the URL (in the URL bar at the top of the browser). Scroll down. Look for the URL that says pwd= (can you imagine a Help Desk person accessing the admin console from a user's PC to look at an issue and then walking away, without realizing that they leave the admin password behind?).

3. If you save the device settings to your hard drive (under System, Preferences) and open the .bin file with Notepad, it reveals the admin password in clear text (first word in the file). Any user can do this with only user access!

4. The web browser function on this unit cannot be turned off. So #2 and #3 above are always available!

If you have an Imagistics Lax machine (especially the higher numbered versions), check them out and report back.


_______________________________________
We don't destroy computers fast we hack them low

pus acum 16 ani
   
marilena13
Moderator

Inregistrat: acum 16 ani
Postari: 925
thx

pus acum 16 ani
   
Pagini: 1  

Mergi la