{"guid":"import-d5e915f712036ff928","title":"Print Me If You Dare","subtitle":"Firmware Modification Attacks and the Rise of Printer Malware","slug":"28c3-4780-en-print_me_if_you_dare","link":"http://events.ccc.de/congress/2011/Fahrplan/events/4780.en.html","description":"Network printers are ubiquitous fixtures within the modern IT infrastructure. Residing within sensitive networks and lacking in security, these devices represent high-value targets that can theoretically be used not only to manipulate and exfiltrate the sensitive information such as network credentials and sensitive documents, but also as fully functional general-purpose bot-nodes which give attackers a stealthy, persistent foothold inside the victim network for further recognizance, exploitation and exfiltration. \n","original_language":"eng","persons":["Ang Cui","Jonathan Voris"],"view_count":370,"promoted":false,"date":"2011-12-29T01:00:00.000+01:00","release_date":"2012-01-04T01:00:00.000+01:00","updated_at":"2026-03-13T14:15:08.569+01:00","tags":["28c3"," Hacking"],"length":3816,"duration":3816,"thumb_url":"https://static.media.ccc.de/media/congress/2011/28c3-4780-en-print_me_if_you_dare_h264.jpg","poster_url":"https://static.media.ccc.de/media/congress/2011/28c3-4780-en-print_me_if_you_dare_h264_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2011/import-d5e915f712036ff928-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2011/import-d5e915f712036ff928-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/28c3-4780-en-print_me_if_you_dare","url":"https://api.media.ccc.de/public/events/import-d5e915f712036ff928","conference_title":"28C3: behind enemy lines","conference_url":"https://api.media.ccc.de/public/conferences/28c3","related":[{"event_id":1532,"event_guid":"import-ffd70d7435e43e1a5e","weight":2},{"event_id":1547,"event_guid":"import-6b95a8a622b3d95c87","weight":4},{"event_id":1571,"event_guid":"import-d31b8d9b757884b585","weight":3},{"event_id":1575,"event_guid":"import-743191fd7e877fb432","weight":3},{"event_id":1580,"event_guid":"import-7cc65ec6f710a801aa","weight":2},{"event_id":1590,"event_guid":"import-6e9147236a7cb3f1ce","weight":2},{"event_id":1600,"event_guid":"import-bd4b532fec427e30cb","weight":2},{"event_id":1606,"event_guid":"import-dc19512cf9bb9158fd","weight":2},{"event_id":1609,"event_guid":"import-68a1981706215efc82","weight":2},{"event_id":1623,"event_guid":"import-7ff6454ab2125d8918","weight":2},{"event_id":1642,"event_guid":"import-fa7c344d969e1f7c8d","weight":2},{"event_id":1655,"event_guid":"import-4fd5a1fd16f55e0a18","weight":6},{"event_id":2167,"event_guid":"1116a02b-0312-4949-9921-d605148bfccb","weight":2},{"event_id":2291,"event_guid":"2f68e356-6c3f-4034-9640-c06d717ed96b","weight":2},{"event_id":2951,"event_guid":"2e3d2878-e8b0-44cd-aea8-baf52be25ecf","weight":2},{"event_id":3750,"event_guid":"bc9fff95-ca0f-4448-9c4c-875609353da7","weight":2}],"recordings":[{"size":489,"length":3816,"mime_type":"video/webm","language":"eng","filename":"28c3-4780-en-print_me_if_you_dare.webm","state":"downloaded","folder":"webm","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:50.011+01:00","recording_url":"https://cdn.media.ccc.de/congress/2011/webm/28c3-4780-en-print_me_if_you_dare.webm","url":"https://api.media.ccc.de/public/recordings/3148","event_url":"https://api.media.ccc.de/public/events/import-d5e915f712036ff928","conference_url":"https://api.media.ccc.de/public/conferences/28c3"},{"size":489,"length":3816,"mime_type":"audio/ogg","language":"eng","filename":"28c3-4780-en-print_me_if_you_dare.ogg","state":"downloaded","folder":"ogg-audio-only","high_quality":true,"width":720,"height":576,"updated_at":"2014-05-31T23:45:44.610+02:00","recording_url":"https://cdn.media.ccc.de/congress/2011/ogg-audio-only/28c3-4780-en-print_me_if_you_dare.ogg","url":"https://api.media.ccc.de/public/recordings/3149","event_url":"https://api.media.ccc.de/public/events/import-d5e915f712036ff928","conference_url":"https://api.media.ccc.de/public/conferences/28c3"}]}