515 - Lpd
💡 学习提示: 本文档介绍 515 - LPD 的渗透测试方法,适合信息安全初学者和从业人员参考。
⚠️ 法律声明: 本文档仅供学习和授权测试使用。未经授权的系统测试可能违反法律法规。
⚠️ 法律声明: 本文档仅供学习和授权测试使用。未经授权的系统测试可能违反法律法规。
515 渗透测试 Line Printer Daemon (LPD)
简介 to LPD 协议
In the 1980s, the Line Printer Daemon (LPD) protocol was developed in Berkeley Unix, which later became formalized through RFC1179. This protocol operates over port 515/tcp, allowing interactions through the lpr command. The essence of printing via LPD involves sending a control file (to specify job details and user) along with a data file (which holds the print information). While the control file allows the selection of various file formats for the data file, the handling of these files is determined by the specific LPD implementation. A widely recognized implementation for Unix-like systems is LPRng. Notably, the LPD protocol can be exploited to execute malicious PostScript or PJL print jobs.
Tools for Interacting with LPD Printers
PRET introduces two essential tools, lpdprint and lpdtest, offering a straightforward method to interact with LPD-compatible printers. These tools enable a range of actions from printing data to manipulating files on the printer, such as downloading, uploading, or deleting:
For individuals interested in further exploring the realm of printer hacking, a comprehensive resource can be found here: Hacking Printers.
Shodan
port 515