Difference between revisions of "Print job access"
From Hacking Printers
Line 1: | Line 1: | ||
− | The most valuable data found on printers is print jobs themselves. Even in a digital world, important documents are printed and kept as hard copies. In high security environments with encrypted hard disks and network traffic, printers might be the weakest link in the security chain. | + | The most valuable data found on printers is print jobs themselves. Even in a digital world, important documents are printed and kept as hard copies. In high security environments with encrypted hard disks and network traffic, printers might be the '''weakest link''' in the security chain. |
''Currently, the following print job access categories are discussed in this wiki:'' | ''Currently, the following print job access categories are discussed in this wiki:'' |
Latest revision as of 16:36, 31 January 2017
The most valuable data found on printers is print jobs themselves. Even in a digital world, important documents are printed and kept as hard copies. In high security environments with encrypted hard disks and network traffic, printers might be the weakest link in the security chain.
Currently, the following print job access categories are discussed in this wiki:
- Print job retention – Obtaining documents printed by other users (the ultimate goal in printer hacking)
- Print job manipulation – Editing documents printed by other users (overlay graphics and further pranks)