VIDEO
Pentest Pro Tips with Tom #4: Using Printer Access to Circumvent an Internal Firewall
Video Summary:
Warning: Geeky technical content ahead! Welcome to another exciting Pentest Pro Tips "Hack of the Week" with Tom Pohl! This week Tom returns to one of his favorite pentest attack targets--the printer. In this instance, some of Tom's pentest attack tactics are blocked by the client's internal firewall, but watch to discover how he uses the printer to circumvent this internal firewall! Don't forget to subscribe, like, and share to stay up-to-date with the latest cybersecurity exploits and defenses. Stay secure, and we'll see you in the next episode! #pentester #pentesting #pentest
Warning: Geeky technical content ahead! Welcome to another exciting Pentest Pro Tips "Hack of the Week" with Tom Pohl! This week Tom returns to one of his favorite pentest attack targets--the printer. In this instance, some of Tom's pentest attack tactics are blocked by the client's internal firewall, but watch to discover how he uses the printer to circumvent this internal firewall! Don't forget to subscribe, like, and share to stay up-to-date with the latest cybersecurity exploits and defenses. Stay secure, and we'll see you in the next episode! #pentester #pentesting #pentest