Difference between revisions of "PFT"

From Hacking Printers
Jump to: navigation, search
(Created page with "While printer manufacturers added various proprietary featured to PostScript and PJL, their standards -- and in particular the possibility to access the file system -- date ba...")
 
Line 1: Line 1:
While printer manufacturers added various proprietary featured to PostScript and PJL, their standards -- and in particular the possibility to access the file system -- date back to the 80s \cite{press1985postscript} and 90s \cite{hp1997pjl}. For PJL, this issue has first been demonstrated by \cite{phenoelit2002embedded} who wrote the ''PFT and Hijetter''\footnote{FtR of Phenoelit, \textit{PFT and Hijetter}, \url{http://www.phenoelit.org/hp/}, Jun. 2016} programs to perform file operations on HP LaserJets using legitimate PJL commands which heavily inspired [[PRET]].
+
PFT, libPJL and Hijetter were the first publicaly available C++ tools for printer exploitation, released by the Phenoelit in the early 2000s to explore printers via their [[PJL]] interface. This includes access to PJL variables, the printer's file system and the control panel display and allow penetration testers to set and crack PJL passwords.
  
tbd: a
+
== External links ==
  
The Hijetter gives you the opportunity to explore printers via their PJL interface. This includes access to the environment variables the file system and the display of the target. You might play around with these elements in order to improve or decrease the performance and usability of a printer.
+
* [http://www.phenoelit.org/hp/ Official website]
This was the first attempt of a Perl coder to use VC++.
+
 
+
 
+
crack the password,
+
dump and set PJL environment variables
+
 
+
pft Printer Job Language library and tool
+
 
+
http://m.blog.csdn.net/article/details?id=46874173
+

Revision as of 20:05, 10 January 2017

PFT, libPJL and Hijetter were the first publicaly available C++ tools for printer exploitation, released by the Phenoelit in the early 2000s to explore printers via their PJL interface. This includes access to PJL variables, the printer's file system and the control panel display and allow penetration testers to set and crack PJL passwords.

External links