SlideShare a Scribd company logo
PostScript: Danger Ahead?!

               Andrei Costin <andrei@andreicostin.com>




     Affiliation - PhD student
whoami: in-between SW/HW hacker

                  Hacking MFPs (for fun & profit)
                                                    Holistic
                                                    Security
Mifare Classic MFCUK                                Interest




                  http://andreicostin.com/papers/


                            PHDAYS2012                         1
Agenda



         1. Quick refresher

         2. What about PostScript?

         3. So, what and how did you find?

         4. Attacks in a nutshell

         5. Solutions and conclusions




                         PHDAYS2012          2
MFPs carry large abuse potential




                     PHDAYS2012    3
MFP hacking goes back to the 1960’s

                                             The “micro”-film camera, marked X




Patent drawing, 1967



           Electronics/hardware hacking


“Spies in the Xerox machine”
                                PHDAYS2012                                       4
Modern printer hacking goes back almost a
decade


2002                    2006                2010-2012
Initial printer hacks   Broader & deeper    Revived printer hacking
(FX/pH)                 printer hacking     interest
                        (irongeek)
                                            This talk focuses mainly on
                                            remote code execution
                                            inside MFPs/printers




                               PHDAYS2012                                 5
In 2010 demo’d : mapping public MFPs




http://www.youtube.com/watch?v=t44GibiCoCM
                                     PHDAYS2012   6
… and generic MFP payload delivery using Word




http://www.youtube.com/watch?v=KrWFOo2RAnk (there are false claims on this discovery)
                                   PHDAYS2012                                         7
… and generic MFP payload delivery using Java




http://www.youtube.com/watch?v=JcfxvZml6-Y
                                     PHDAYS2012   8
Agenda



         1. Quick refresher

         2. What about PostScript?

         3. So, what and how did you find?

         4. Attacks in a nutshell

         5. Solutions and conclusions




                         PHDAYS2012          9
PostScript who? It’s Adobe’s PDF big brother




                     PHDAYS2012                10
PS is build to handle complex processing tasks
Graphics & patterns   Complex math         Web servers




Ray-tracing, OpenGL   Milling machine     XML Parsers
                      PHDAYS2012                     11
Then, what exactly is PostScript?

 PostScript IS NOT just a static data stream like




 PostScript IS a
     Dynamically typed & concatenative
     Stack-based
     Turing-complete
     Programming language
     What does it all mean? Exactly!



                              PHDAYS2012             12
What happens when printing PS?

 User writes the doc and hits Print
     PS printer driver transforms it to PS stream for specific device
     PS data stream on PRN


 User Opens a PS file from email/hdd
     PC-based PS interpreter processes it
     PS data stream executes on PC


 In both cases, PS data stream IS A PS program
      Program != static data


                              PHDAYS2012                             13
Demo1
“Programming language” aspect

 Programming languages 101:
     Control statements
         if/else
         loop
         while


 Simplest DoS attack is an “infinite loop”
     !%
     {} loop



                              PHDAYS2012      14
Demo2
“Dynamically typed concatenative" aspect

 You wonder why your smart IDS/IPS rules stopped working?


 Here is why:
     ps_dynamic_statement_construction_and_execution.ps
     Obfuscation at its best built-into the language!


 Solution:
     Bad news: Need dynamic execution sandbox
     Good news: It’s coming up – see sandbox slides below


                            PHDAYS2012                       15
Demo3
Real world application – MSOffice PS crash


 Submitted to MS


 Apparently this is not exploitable as in smash stack attacks 


 But it opens an interesting perspective on MS Office…




                             PHDAYS2012                            16
Demo4
Real world application – GhostScript autoprn


 One got to love custom extensions


 Sends a print-job stream directly by just opening the file


 Requires more investigation, but perspective is interesting…




                             PHDAYS2012                          17
Dynamic document forging/generation + SocEng



      User computer                User printout




                      PHDAYS2012                   18
Dynamic document forging/generation + SocEng




 Computer side – SocEng bait      Printer/MFP side – PS virus




                           PHDAYS2012                           19
Where is PostScript? (Vendor-wise view)



       Applications incorporating the PS interpreter




      Applications/vendors producing the PS interpreter




       The PS interpreter specifications and standards
                         PHDAYS2012                       20
Where is PostScript? (Role-wise view)




                     PHDAYS2012         21
PostScript Web 2.0 Style

 PostScript made it into the web as well

 Around 20+ services found to be vulnerable to various degrees
     Google was one them -> Got a “hall of fame” reward 

 Some fun facts
     Effective for host exploitation and information gathering
     Some ran GS as root user
     Some ran GS without –dSAFER
     All of them ran vulnerable GS versions
          Heap and stack overflows and what-not…

 More details to come…
                             PHDAYS2012                           22
Agenda



         1. Quick refresher

         2. What about PostScript?

         3. What else was found?

         4. Attacks in a nutshell

         5. Solutions and conclusions




                         PHDAYS2012     23
A PS-based firmware upload was required




                    PHDAYS2012            24
This is too good to be true….

      VxWorks API     Debug/QA API     Logging API
        /vx***           /QA***       /***EventLog




        Pump PWM                     BillingMeters API
      /***pumppwm                     /***meter***




       RAMdisk API       RAM API        Flash API
       /***ramdisk     /***ram***     /***flash***




                      PHDAYS2012                         25
Memory dumping reveals computing secrets




 SANS Security Predictions 2012/2013 - The Emerging Security Threat
     Memory Scraping Will Become More Common

                             PHDAYS2012                           26
Admin restriction fail to prevent memory dumping




                    PHDAYS2012                 27
Password setup is sniffed by the attacker




                  1) HTTP GET request – password clear text

                                   2) HTTP reply




                      PHDAYS2012                              28
Basic auth password can be dumped




                  1) Authorization: Basic YWRtaW4yO…

                         2) HTTP/1.1 200 OK




                   PHDAYS2012                          29
HTTPS / IPsec secrets are “defaulty” & “leaky”




            0x66306630663066306630663066302222




                        PHDAYS2012               30
Attacker has access to printed document details




                     PHDAYS2012                   31
Attacker has access to network topology – no-scan




                     PHDAYS2012                 32
Attacker has access to BSD-style sockets…




                 Two-way BSD-style sockets communication




                      PHDAYS2012                           33
Analyzed MFP cannot protect effectively
Protection measures                        Fail / warn / ok
Privilege level separation

Secure password setup

Secure (basic) auth

HTTPS, IPSEC secrets protection

Network topology protection

In-memory document protection

Restrict sockets on unprivileged modules
                             PHDAYS2012                       34
Plenty of Xerox printers share affected PS firmware
update mechanism




                     PHDAYS2012                   35
Agenda



         1. Quick refresher

         2. What about PostScript?

         3. So, what and how did you find?

         4. Attacks in a nutshell

         5. Solutions and conclusions




                         PHDAYS2012          36
Remote attacks can be used to extract data
Stage 1 – SocEng   Stage 2 - Printing   Stage 3 – Exploiting/spying


 Sent
 by                   Print
 email                attachment


                                               Malware exploits
                                               internal netw. or
                                               extracts data

                                           Spool
                                           malicious
                                           byte
                                           stream
 Drive-
 by                   Print
 print                from
                      web

                        PHDAYS2012                                 37
Agenda



         1. Quick refresher

         2. What about PostScript?

         3. So, what and how did you find?

         4. Attacks in a nutshell

         5. What’s next, solutions, conclusions




                         PHDAYS2012               38
Network-wise mitigation solution



VLAN1
 PCs


                                       Print Server
                                    PS/PJL-sandboxed



                                       VLAN networks
VLAN2
                                       Unsafe print jobs
 PRNs
                                       Safe print jobs
                     PHDAYS2012                        39
Protocol-wise mitigation solution
PostScript/PJL sandbox
 Secure PostScript Execution/Interpreter Sandbox
 Set of online/offline tools for analysis & reporting
 Wepawet-like, but for PostScript related data
 Subscribe for updates: postscript-sec@andreicostin.com




                           PHDAYS2012                      40
What’s next? PS + MSF + FS + Sockets = PWN!




                    PHDAYS2012                41
Solutions

Actor       Suggested actions

Admins      •   Disable PS processing on printers
            •   Route print-jobs thru sandboxed print-servers
            •   Replace PS drivers with PCL ones (well…)
            •   Disable Language Operator Authorization
            •   Look for security bulletins and patch
            •   Sandbox printers in your network
            •   Include MFPs in security audit lifecycle


Users
            • Do not print from untrusted sources
            • Be suspicious on PostScript files

Vendors     • Create realistic MFP threat models
            • Do not enable/expose super-APIs


            PHDAYS2012                                          42
Acknowledgements

The Xerox-related PostScript work & research done under support of




                            PHDAYS2012                          43
Acknowledgements

Thanks to EURECOM for great advise and support for this topic




                            PHDAYS2012                          44
Thanks/resources
Xerox Security Team             Positive responses, active mitigation



www.tinaja.com                  Insanely large free postscript resources dir



www.anastigmatix.net            Very good postscript resources



www.acumentraining.com          Very good postscript resources


Personal thanks
Igor Marinescu, MihaiSa         Great logistic support and friendly help


                          PHDAYS2012                                       45
Take aways
              MFPs are badly secured computing
              platforms with large abuse potential

              Upcoming MFP attack could include
              viruses in Office and PS documents that
              extract organization data
              Securing the MFP infrastructure requires
              better segmentation, strong credentials,
              and continious vulnerability patching

              Check upcoming research papers
              Check www.youtube.com/user/zveriu
              Join: postscript-sec@andreicostin.com

              Andrei Costin andrei@andreicostin.com
Questions?    http://andreicostin.com/papers

                            PHDAYS2012                    46

More Related Content

PDF
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
PDF
Μορφές των αρχείων γραμματοσειρών: TrueType (TTF), PostScript y OpenType (OTF)
PPT
Schindler's List Postscript
PPT
2nd ARM Developer Day - mbed Workshop - ARM
PDF
FOSDEM 2014
PDF
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
PPTX
Raspberry pi
PDF
FusionInventory at LSM/RMLL 2012
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
Μορφές των αρχείων γραμματοσειρών: TrueType (TTF), PostScript y OpenType (OTF)
Schindler's List Postscript
2nd ARM Developer Day - mbed Workshop - ARM
FOSDEM 2014
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
Raspberry pi
FusionInventory at LSM/RMLL 2012

Similar to PostScript: Danger Ahead?! (20)

PPT
Managing software assets
PDF
Tsunami of Technologies. Are we prepared?
PDF
Dev and Blind - Attacking the weakest Link in IT Security
PDF
[Solution] How to Capture and Upload Print Jobs as PDF Files to FTP While Aut...
PPT
Android Developer Meetup
PDF
amrapali builders @@hacking printers.pdf
PPTX
Two-For-One Talk: Malware Analysis for Everyone
PDF
Vn-info meetup on Node.js
PDF
Fight with linux reverse
PPT
Anton Chuvakin on Honeypots
PPT
Binary system
PDF
Windows 10 IoT Core, a real sample
PDF
3-Way Scripts as a Practical Platform for Secure Distributed Code in Clouds
PDF
State of Fedora (Flock 2015)
PDF
Droidcon it-2014-marco-grassi-viaforensics
DOCX
SRS REPORT ON A ANDROID GAME
PDF
Comparison of ESP programming platforms
PDF
WiFi mesh network(ESP32 mStar and mesh topology)
PDF
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
PDF
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
Managing software assets
Tsunami of Technologies. Are we prepared?
Dev and Blind - Attacking the weakest Link in IT Security
[Solution] How to Capture and Upload Print Jobs as PDF Files to FTP While Aut...
Android Developer Meetup
amrapali builders @@hacking printers.pdf
Two-For-One Talk: Malware Analysis for Everyone
Vn-info meetup on Node.js
Fight with linux reverse
Anton Chuvakin on Honeypots
Binary system
Windows 10 IoT Core, a real sample
3-Way Scripts as a Practical Platform for Secure Distributed Code in Clouds
State of Fedora (Flock 2015)
Droidcon it-2014-marco-grassi-viaforensics
SRS REPORT ON A ANDROID GAME
Comparison of ESP programming platforms
WiFi mesh network(ESP32 mStar and mesh topology)
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
Ad

More from Positive Hack Days (20)

PPTX
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
PPTX
Как мы собираем проекты в выделенном окружении в Windows Docker
PPTX
Типовая сборка и деплой продуктов в Positive Technologies
PPTX
Аналитика в проектах: TFS + Qlik
PPTX
Использование анализатора кода SonarQube
PPTX
Развитие сообщества Open DevOps Community
PPTX
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
PPTX
Автоматизация построения правил для Approof
PDF
Мастер-класс «Трущобы Application Security»
PDF
Формальные методы защиты приложений
PDF
Эвристические методы защиты приложений
PDF
Теоретические основы Application Security
PPTX
От экспериментального программирования к промышленному: путь длиной в 10 лет
PDF
Уязвимое Android-приложение: N проверенных способов наступить на грабли
PPTX
Требования по безопасности в архитектуре ПО
PDF
Формальная верификация кода на языке Си
PPTX
Механизмы предотвращения атак в ASP.NET Core
PDF
SOC для КИИ: израильский опыт
PDF
Honeywell Industrial Cyber Security Lab & Services Center
PDF
Credential stuffing и брутфорс-атаки
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Как мы собираем проекты в выделенном окружении в Windows Docker
Типовая сборка и деплой продуктов в Positive Technologies
Аналитика в проектах: TFS + Qlik
Использование анализатора кода SonarQube
Развитие сообщества Open DevOps Community
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Автоматизация построения правил для Approof
Мастер-класс «Трущобы Application Security»
Формальные методы защиты приложений
Эвристические методы защиты приложений
Теоретические основы Application Security
От экспериментального программирования к промышленному: путь длиной в 10 лет
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Требования по безопасности в архитектуре ПО
Формальная верификация кода на языке Си
Механизмы предотвращения атак в ASP.NET Core
SOC для КИИ: израильский опыт
Honeywell Industrial Cyber Security Lab & Services Center
Credential stuffing и брутфорс-атаки
Ad

Recently uploaded (20)

PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Getting Started with Data Integration: FME Form 101
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
STKI Israel Market Study 2025 version august
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Architecture types and enterprise applications.pdf
PPTX
Modernising the Digital Integration Hub
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
A comparative study of natural language inference in Swahili using monolingua...
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Getting Started with Data Integration: FME Form 101
Module 1.ppt Iot fundamentals and Architecture
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
STKI Israel Market Study 2025 version august
Getting started with AI Agents and Multi-Agent Systems
Hindi spoken digit analysis for native and non-native speakers
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
DP Operators-handbook-extract for the Mautical Institute
Architecture types and enterprise applications.pdf
Modernising the Digital Integration Hub
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Final SEM Unit 1 for mit wpu at pune .pptx
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Enhancing emotion recognition model for a student engagement use case through...
Group 1 Presentation -Planning and Decision Making .pptx
NewMind AI Weekly Chronicles - August'25-Week II
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
A comparative study of natural language inference in Swahili using monolingua...

PostScript: Danger Ahead?!

  • 1. PostScript: Danger Ahead?! Andrei Costin <andrei@andreicostin.com> Affiliation - PhD student
  • 2. whoami: in-between SW/HW hacker Hacking MFPs (for fun & profit) Holistic Security Mifare Classic MFCUK Interest http://andreicostin.com/papers/ PHDAYS2012 1
  • 3. Agenda 1. Quick refresher 2. What about PostScript? 3. So, what and how did you find? 4. Attacks in a nutshell 5. Solutions and conclusions PHDAYS2012 2
  • 4. MFPs carry large abuse potential PHDAYS2012 3
  • 5. MFP hacking goes back to the 1960’s The “micro”-film camera, marked X Patent drawing, 1967 Electronics/hardware hacking “Spies in the Xerox machine” PHDAYS2012 4
  • 6. Modern printer hacking goes back almost a decade 2002 2006 2010-2012 Initial printer hacks Broader & deeper Revived printer hacking (FX/pH) printer hacking interest (irongeek) This talk focuses mainly on remote code execution inside MFPs/printers PHDAYS2012 5
  • 7. In 2010 demo’d : mapping public MFPs http://www.youtube.com/watch?v=t44GibiCoCM PHDAYS2012 6
  • 8. … and generic MFP payload delivery using Word http://www.youtube.com/watch?v=KrWFOo2RAnk (there are false claims on this discovery) PHDAYS2012 7
  • 9. … and generic MFP payload delivery using Java http://www.youtube.com/watch?v=JcfxvZml6-Y PHDAYS2012 8
  • 10. Agenda 1. Quick refresher 2. What about PostScript? 3. So, what and how did you find? 4. Attacks in a nutshell 5. Solutions and conclusions PHDAYS2012 9
  • 11. PostScript who? It’s Adobe’s PDF big brother PHDAYS2012 10
  • 12. PS is build to handle complex processing tasks Graphics & patterns Complex math Web servers Ray-tracing, OpenGL Milling machine XML Parsers PHDAYS2012 11
  • 13. Then, what exactly is PostScript?  PostScript IS NOT just a static data stream like  PostScript IS a  Dynamically typed & concatenative  Stack-based  Turing-complete  Programming language  What does it all mean? Exactly! PHDAYS2012 12
  • 14. What happens when printing PS?  User writes the doc and hits Print  PS printer driver transforms it to PS stream for specific device  PS data stream on PRN  User Opens a PS file from email/hdd  PC-based PS interpreter processes it  PS data stream executes on PC  In both cases, PS data stream IS A PS program  Program != static data PHDAYS2012 13
  • 15. Demo1 “Programming language” aspect  Programming languages 101:  Control statements  if/else  loop  while  Simplest DoS attack is an “infinite loop”  !%  {} loop PHDAYS2012 14
  • 16. Demo2 “Dynamically typed concatenative" aspect  You wonder why your smart IDS/IPS rules stopped working?  Here is why:  ps_dynamic_statement_construction_and_execution.ps  Obfuscation at its best built-into the language!  Solution:  Bad news: Need dynamic execution sandbox  Good news: It’s coming up – see sandbox slides below PHDAYS2012 15
  • 17. Demo3 Real world application – MSOffice PS crash  Submitted to MS  Apparently this is not exploitable as in smash stack attacks   But it opens an interesting perspective on MS Office… PHDAYS2012 16
  • 18. Demo4 Real world application – GhostScript autoprn  One got to love custom extensions  Sends a print-job stream directly by just opening the file  Requires more investigation, but perspective is interesting… PHDAYS2012 17
  • 19. Dynamic document forging/generation + SocEng User computer User printout PHDAYS2012 18
  • 20. Dynamic document forging/generation + SocEng Computer side – SocEng bait Printer/MFP side – PS virus PHDAYS2012 19
  • 21. Where is PostScript? (Vendor-wise view) Applications incorporating the PS interpreter Applications/vendors producing the PS interpreter The PS interpreter specifications and standards PHDAYS2012 20
  • 22. Where is PostScript? (Role-wise view) PHDAYS2012 21
  • 23. PostScript Web 2.0 Style  PostScript made it into the web as well  Around 20+ services found to be vulnerable to various degrees  Google was one them -> Got a “hall of fame” reward   Some fun facts  Effective for host exploitation and information gathering  Some ran GS as root user  Some ran GS without –dSAFER  All of them ran vulnerable GS versions  Heap and stack overflows and what-not…  More details to come… PHDAYS2012 22
  • 24. Agenda 1. Quick refresher 2. What about PostScript? 3. What else was found? 4. Attacks in a nutshell 5. Solutions and conclusions PHDAYS2012 23
  • 25. A PS-based firmware upload was required PHDAYS2012 24
  • 26. This is too good to be true…. VxWorks API Debug/QA API Logging API /vx*** /QA*** /***EventLog Pump PWM BillingMeters API /***pumppwm /***meter*** RAMdisk API RAM API Flash API /***ramdisk /***ram*** /***flash*** PHDAYS2012 25
  • 27. Memory dumping reveals computing secrets  SANS Security Predictions 2012/2013 - The Emerging Security Threat  Memory Scraping Will Become More Common PHDAYS2012 26
  • 28. Admin restriction fail to prevent memory dumping PHDAYS2012 27
  • 29. Password setup is sniffed by the attacker 1) HTTP GET request – password clear text 2) HTTP reply PHDAYS2012 28
  • 30. Basic auth password can be dumped 1) Authorization: Basic YWRtaW4yO… 2) HTTP/1.1 200 OK PHDAYS2012 29
  • 31. HTTPS / IPsec secrets are “defaulty” & “leaky” 0x66306630663066306630663066302222 PHDAYS2012 30
  • 32. Attacker has access to printed document details PHDAYS2012 31
  • 33. Attacker has access to network topology – no-scan PHDAYS2012 32
  • 34. Attacker has access to BSD-style sockets… Two-way BSD-style sockets communication PHDAYS2012 33
  • 35. Analyzed MFP cannot protect effectively Protection measures Fail / warn / ok Privilege level separation Secure password setup Secure (basic) auth HTTPS, IPSEC secrets protection Network topology protection In-memory document protection Restrict sockets on unprivileged modules PHDAYS2012 34
  • 36. Plenty of Xerox printers share affected PS firmware update mechanism PHDAYS2012 35
  • 37. Agenda 1. Quick refresher 2. What about PostScript? 3. So, what and how did you find? 4. Attacks in a nutshell 5. Solutions and conclusions PHDAYS2012 36
  • 38. Remote attacks can be used to extract data Stage 1 – SocEng Stage 2 - Printing Stage 3 – Exploiting/spying Sent by Print email attachment Malware exploits internal netw. or extracts data Spool malicious byte stream Drive- by Print print from web PHDAYS2012 37
  • 39. Agenda 1. Quick refresher 2. What about PostScript? 3. So, what and how did you find? 4. Attacks in a nutshell 5. What’s next, solutions, conclusions PHDAYS2012 38
  • 40. Network-wise mitigation solution VLAN1 PCs Print Server PS/PJL-sandboxed VLAN networks VLAN2 Unsafe print jobs PRNs Safe print jobs PHDAYS2012 39
  • 41. Protocol-wise mitigation solution PostScript/PJL sandbox  Secure PostScript Execution/Interpreter Sandbox  Set of online/offline tools for analysis & reporting  Wepawet-like, but for PostScript related data  Subscribe for updates: postscript-sec@andreicostin.com PHDAYS2012 40
  • 42. What’s next? PS + MSF + FS + Sockets = PWN! PHDAYS2012 41
  • 43. Solutions Actor Suggested actions Admins • Disable PS processing on printers • Route print-jobs thru sandboxed print-servers • Replace PS drivers with PCL ones (well…) • Disable Language Operator Authorization • Look for security bulletins and patch • Sandbox printers in your network • Include MFPs in security audit lifecycle Users • Do not print from untrusted sources • Be suspicious on PostScript files Vendors • Create realistic MFP threat models • Do not enable/expose super-APIs PHDAYS2012 42
  • 44. Acknowledgements The Xerox-related PostScript work & research done under support of PHDAYS2012 43
  • 45. Acknowledgements Thanks to EURECOM for great advise and support for this topic PHDAYS2012 44
  • 46. Thanks/resources Xerox Security Team Positive responses, active mitigation www.tinaja.com Insanely large free postscript resources dir www.anastigmatix.net Very good postscript resources www.acumentraining.com Very good postscript resources Personal thanks Igor Marinescu, MihaiSa Great logistic support and friendly help PHDAYS2012 45
  • 47. Take aways  MFPs are badly secured computing platforms with large abuse potential  Upcoming MFP attack could include viruses in Office and PS documents that extract organization data  Securing the MFP infrastructure requires better segmentation, strong credentials, and continious vulnerability patching  Check upcoming research papers  Check www.youtube.com/user/zveriu  Join: postscript-sec@andreicostin.com Andrei Costin andrei@andreicostin.com Questions? http://andreicostin.com/papers PHDAYS2012 46