>not running DOOM on your printer
While this is somewhat amusing the point of it is to demonstrate that this printer has potentially serious vulnerabilities in its security. Doom is just being used as a proof of concept.
>From the exploitation standpoint, hacking the machine was trivial, as Jordon discovered that the device has a web interface with no username or password protecting it.
>On initial inspection, this interface was of little interest, only showing ink levels and printing status. But it soon became apparent a hacker could use this interface to trigger an update to the machine’s firmware - the underlying code that is essentially the heart and soul of the printer.
>An outsider could thus have changed settings on the printer to convince it to ask for updates from a malicious server rather than Canon’s official channel.
>Jordon took advantage of what he described as “terrible” encryption protecting the firmware to add some tweaks to its code, enabling him to control the machine from afar.
screen + input of some kind = doom