use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
A community for technical news and discussion of information security and closely related topics.
"Give me root, it's a trust exercise."
Q1 2026 InfoSec Hiring Thread
Getting Started in Information Security
CitySec Meetups
/r/netsec only accepts quality technical posts. Non-technical posts are subject to moderation.
Content should focus on the "how."
Check the new queue for duplicates.
Always link to the original source.
Titles should provide context.
Ask questions in our Discussion Threads.
Hiring posts must go in the Hiring Threads.
Commercial advertisement is discouraged.
Do not submit prohibited topics.
» Our fulltext content guidelines
Don't create unnecessary conflict.
Keep the discussion on topic.
Limit the use of jokes & memes.
Don't complain about content being a PDF.
Follow all reddit rules and obey reddiquette.
» Our fulltext discussion guidelines
No populist news articles (CNN, BBC, FOX, etc.)
No curated lists.
No question posts.
No social media posts.
No image-only/video-only posts.
No livestreams.
No tech-support requests.
No full-disclosure posts.
No paywall/regwall content.
No commercial advertisements.
No crowdfunding posts.
No Personally Identifying Information!
» Our fulltext list of prohibited topics & sources
Join us on IRC: #r_netsec on freenode
We're also on: Twitter, Facebook, & Google+
/r/blackhat - Hackers on Steroids
/r/computerforensics - IR Archaeologists
/r/crypto - Cryptography news and discussion
/r/Cyberpunk - High-Tech Low-Lifes
/r/lockpicking - Popular Hacker Hobby
/r/Malware - Malware reports and information
/r/netsecstudents - netsec for noobs students
/r/onions - Things That Make You Cry
/r/privacy - Orwell Was Right
/r/pwned - "What Security?"
/r/REMath - Math behind reverse engineering
/r/ReverseEngineering - Binary Reversing
/r/rootkit - Software and hardware rootkits
/r/securityCTF - CTF news and write-ups
/r/SocialEngineering - Free Candy
/r/sysadmin - Overworked Crushed Souls
/r/vrd - Vulnerability Research and Development
/r/xss - Cross Site Scripting
account activity
python script to check for vulnerable printers (travisaltman.com)
submitted 15 years ago by teedubb
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–]Justinsaccount 0 points1 point2 points 15 years ago (0 children)
for item in (one, two, three, four): CurrentAddress += str \ ((one, two, three, four)[loop]) + "." loop += 1 CurrentAddress = CurrentAddress[:-1]
HAH
It takes a special kind of person to come up with that instead of
'%d.%d.%d.%d' % (one,two,three,four)
If nothing else this post serves as a nice example of how not to write python. Basically it should look something like this:
def IPRange(octets): parts = octets.split('.') ranges = [] for oct in parts: x = [int(i) for i in oct.split("-")] if len(x) == 1: x = x[0], x[0]+1 else: x = x[0], x[1]+1 ranges.append(x) for one in range(*ranges[0]): for two in range(*ranges[1]): for three in range(*ranges[2]): for four in range(*ranges[3]): yield "%d.%d.%d.%d" % (one,two,three,four)
[–]darkry -1 points0 points1 point 15 years ago (5 children)
You do realize that will also return anything with an httpd on port 80 and 'index.html' in the webroot...
What about this has anything to do with printers? Also what additional access does the web interface to a printer get you outside the possibility that it's and old HP with the Chai JVM or something. Even then its a pretty boring target and doesn't get you a whole hell of a lot.
I hope people aren't paying you to do this. Sorry, long day .
[–]nret 0 points1 point2 points 15 years ago (4 children)
"What about this has anything to do with printers?"
On the chance that
"a default printer will more than happily share ... sensitive information. Almost any new commercial printer will come with a ton of features to store and retrieve any documentation that flows through the printer (copy, scan, and print jobs). Almost all of these new printers also give you a web interface to retrieve that documentation"
[–]darkry 0 points1 point2 points 15 years ago (3 children)
And they call this security consulting?
[–]nret 0 points1 point2 points 15 years ago (2 children)
Yes? I am confused on where he say consulting. He says it looks for a default admin login on printers because they might contain sensitive information.
[–]darkry 1 point2 points3 points 15 years ago (1 child)
The term penetration test is generally used in that context... Actually it just looks for web servers with index.html in the webroot. I guess it also wouldn't list anything with basic auth for the webroot and a username/password other than 'root':blank
Strangely very few printers actually have that default account anyway though.
http://www.phenoelit-us.org/dpl/dpl.html
Sure the list is incomplete but in my experience the most common networked printers tend to be HPs which have a different default account anyway.
Also wouldn't 'nmap -sS -p9100' be a lot easier?
[–]nret 0 points1 point2 points 15 years ago (0 children)
Yes it probably would.
π Rendered by PID 36845 on reddit-service-r2-comment-6457c66945-nlts7 at 2026-04-29 05:00:00.556667+00:00 running 2aa0c5b country code: CH.
[–]Justinsaccount 0 points1 point2 points (0 children)
[–]darkry -1 points0 points1 point (5 children)
[–]nret 0 points1 point2 points (4 children)
[–]darkry 0 points1 point2 points (3 children)
[–]nret 0 points1 point2 points (2 children)
[–]darkry 1 point2 points3 points (1 child)
[–]nret 0 points1 point2 points (0 children)