PFT

From Hacking Printers
Revision as of 19:36, 9 January 2017 by 134.147.202.176 (Talk) (Created page with "While printer manufacturers added various proprietary featured to PostScript and PJL, their standards -- and in particular the possibility to access the file system -- date ba...")

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

While printer manufacturers added various proprietary featured to PostScript and PJL, their standards -- and in particular the possibility to access the file system -- date back to the 80s \cite{press1985postscript} and 90s \cite{hp1997pjl}. For PJL, this issue has first been demonstrated by \cite{phenoelit2002embedded} who wrote the PFT and Hijetter\footnote{FtR of Phenoelit, \textit{PFT and Hijetter}, \url{http://www.phenoelit.org/hp/}, Jun. 2016} programs to perform file operations on HP LaserJets using legitimate PJL commands which heavily inspired PRET.

tbd: a

The Hijetter gives you the opportunity to explore printers via their PJL interface. This includes access to the environment variables the file system and the display of the target. You might play around with these elements in order to improve or decrease the performance and usability of a printer. This was the first attempt of a Perl coder to use VC++.


crack the password, dump and set PJL environment variables

pft Printer Job Language library and tool

http://m.blog.csdn.net/article/details?id=46874173