[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

skiddy here

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 12
Thread images: 5

File: 1491946501485.jpg (22KB, 480x480px) Image search: [Google]
1491946501485.jpg
22KB, 480x480px
can you embed exploits in (a) printed page(s) of paper to be scanned?
>>
File: 1493227356948.jpg (44KB, 422x381px) Image search: [Google]
1493227356948.jpg
44KB, 422x381px
depends
>>
No. It scans the image/whatever is on the page. It doesn't execute anything on it. Its like taking a picture, nothing more.
"skiddy here" describes it perfectly. Research motherfucker, do it.
>>
I guess the best you could do is embed https://en.wikipedia.org/wiki/EURion_constellation
>>
>>60093620
>This doesn't involve filling buffers and manipulating them
>No processing is done on a piece of image processing hardware
Jesus, /g/
>>
File: 1492922374878.png (390KB, 850x720px) Image search: [Google]
1492922374878.png
390KB, 850x720px
>>60091276
10/10
>>
>>60089756
you can embed qr codes that hotlink to phishing websites
>>
Yes. Mostly you have drivers encapsulate your data well but you can modify the printer driver to send erroneous messages to the printer. Varies a lot what you can do but when that is in place (or you found a hole) you have made an exploit in printed paper.
>>
File: list.jpg (112KB, 822x1024px) Image search: [Google]
list.jpg
112KB, 822x1024px
>>60089756
http://malqr.shielder.it/
>>
depends on the scanner
>>
Yes. Chances are the injection won't work though, and buffer overflows won't work either.
It's a super long shot, since you're basically betting on a stupid bit of code somewhere in the scanning software pipeline that burps up a buffer overflow from a specific number of characters or something.

As for injection... input would be sanitised simply to make the scanner functional.

Doing this blind is nearly impossible. But if you had a copy of the code for the entire process then you'd probably be able to find something.
>>
File: book.png (228KB, 1024x701px) Image search: [Google]
book.png
228KB, 1024x701px
>>60089756
You can certainly inject hacks into a book's metadata and have that bomb out.
Thread posts: 12
Thread images: 5


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.