From b432c51d116db9e92a4e8e006cce427a79051fe0 Mon Sep 17 00:00:00 2001 From: SirBroccoli Date: Tue, 15 Jul 2025 12:47:50 +0200 Subject: [PATCH] Update ad-information-in-printers.md --- .../active-directory-methodology/ad-information-in-printers.md | 1 + 1 file changed, 1 insertion(+) diff --git a/src/windows-hardening/active-directory-methodology/ad-information-in-printers.md b/src/windows-hardening/active-directory-methodology/ad-information-in-printers.md index 2e22f3c46..d5fd320f4 100644 --- a/src/windows-hardening/active-directory-methodology/ad-information-in-printers.md +++ b/src/windows-hardening/active-directory-methodology/ad-information-in-printers.md @@ -103,6 +103,7 @@ The vendor guidance explicitly recommends: --- ## References +- [https://grimhacker.com/2018/03/09/just-a-printer/](https://grimhacker.com/2018/03/09/just-a-printer/) - Rapid7. “Xerox VersaLink C7025 MFP Pass-Back Attack Vulnerabilities.” February 2025. - Canon PSIRT. “Vulnerability Mitigation Against SMTP/LDAP Passback for Laser Printers and Small Office Multifunction Printers.” May 2025.