4.9 • 696 Ratings
🗓️ 29 August 2018
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Thursday, August 30th, 2018 edition of the Santernet Stormsanders Stormcast. |
0:07.4 | My name is Johannes Ulrich and I'm recording from Sevalde, Germany. |
0:13.3 | We got a little bit more detail on these exposed octoprint 3D printers. |
0:20.0 | Now, many of them apparently do have cameras attached so that gives |
0:25.2 | an attacker full access to the camera. Typically these cameras are used to watch the 3D printing |
0:32.6 | happen. Also some users then stream the 3D printing process to YouTube. |
0:39.9 | So you may also expose YouTube credentials, for example, on these printers. |
0:45.3 | There is also one potential destructive attack that we heard about about printers connected |
0:52.7 | via octoprint, and that's just to overheat the printers and cause |
0:56.7 | a fire. That's highly dependent on the exact printer hardware being used. Some printers have |
1:02.3 | protection circuits that will prevent that from happening. Xavier posted a little bit more about |
1:08.2 | this with screenshots and some sample Gcode files and so that can |
1:13.5 | be downloaded via octoprint. That's probably the most direct and most common way this could be |
1:19.2 | exploited, just stealing intellectual property essentially from these 3D printers. |
1:25.3 | Like I mentioned yesterday, don't expose them if you want to proactively search your network for |
1:30.2 | any octoprint connected printers that may exist. |
1:34.1 | They'll look for open port 5,000. |
1:37.0 | That's where the web GUI usually listens on. |
1:42.4 | And Composer is a package manager that's very popular with PHP. It for the most part |
1:50.2 | relies on packages, which is the repository where PHP packages tend to be deposited, |
1:57.2 | that Composer then loads. So a very popular repository of packages that sadly |
2:04.6 | was vulnerable to remote code execution. Sadly the exploitation of this vulnerability was |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.