On Sun, 29 Dec 2013 13:52:13 -0500
Celejar <cele...@gmail.com> wrote:

> > This:
> > 
> > http://www.brother-usa.com/VirData/Content/en-US%5CPrinters%5CConsumer%5CNetworkUsersManual%5CNUM_DCP_7065DN_HL_2280DW_MFC_7360N_7460DN_7860DW_EN_2845.PDF
> > 
> > gave me an idea - they run telnet, but they use some variation of tcp
> > wrappers which forbids any telnet connections (possibly other services
> > too) from anything except maybe 192.168.0.1 (or, 192.168.0.5, or
> > 169.254.0.0/16).
> 
> What did you see there (what page)?

Nothing in particular, just a guess. Manufacturers like to do stuff
like this. Best of them think 'like, everyone and their dog uses
192.168.0.0/24 for the home network, let's secure our product by
denying access from anyone outside'. Of course, to hardcode
192.168.0.0/24 is the easiest these guys can do.

So, I browsed that pdf, searched for IPs, and sure enough, there was
192.168.0.1 as a default gateway example and 192.168.0.5 as a printer
example, and some explanation of LLNR.

> I tried telnetting from my router, an OpenWrt box with address
> 192.168.0.1, and I get:
> 
> Entering character mode
> Escape character is '^]'.
> 
> And then pretty much the same thing: no response, and eventual
> disconnect after several carriage returns.

So, no luck. Maybe it requires some engineering password first.
Can you dump the firmware from the printer?

Reco


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20131230000051.0cd6507ae360156306f7a...@gmail.com

Reply via email to