Multi-service Threats: Attacking and Protecting Network Printers and VoIP Phones alike

02/22/2022
by   Giampaolo Bella, et al.
0

Printing over a network and calling over VoIP technology are routine at present. This article investigates to what extent these services can be attacked using freeware in the real world if they are not configured securely. In finding out that attacks of high impact, termed the Printjack and Phonejack families, could be mounted at least from insiders, the article also observes that secure configurations do not appear to be widely adopted. Users with the necessary skills may put existing security measures in place with printers, but would need novel measures, which the article prototypes, with phones in order for a pair of peers to call each other securely and without trusting anyone else, including sysadmins.

READ FULL TEXT

page 12

page 13

page 17

page 18

page 27

page 30

page 31

research
04/09/2023

Secure Routing Protocol To Mitigate Attacks By Using Blockchain Technology In Manet

MANET is a collection of mobile nodes that communicate through wireless ...
research
08/01/2018

Internet of Drones (IoD): Threats, Vulnerability, and Security Perspectives

The development of the Internet of Drones (IoD) becomes vital because of...
research
11/27/2018

The Untold Secrets of Operational Wi-Fi Calling Services: Vulnerabilities, Attacks, and Countermeasures

Since 2016, all of four major U.S. operators have rolled out nationwide ...
research
05/22/2021

Securing Optical Networks using Quantum-secured Blockchain: An Overview

Deployment of optical network infrastructure and network services is gro...
research
03/18/2020

Vulnerabilities of Connectionist AI Applications: Evaluation and Defence

This article deals with the IT security of connectionist artificial inte...
research
09/29/2021

Might I Get Pwned: A Second Generation Password Breach Alerting Service

Credential stuffing attacks use stolen passwords to log into victim acco...
research
04/17/2019

Authenticated Preambles for Denial of Service Mitigation in LPWANs

In this article we introduce authentication preambles as a mechanism to ...

Please sign up or login with your details

Forgot password? Click here to reset