2
« on: April 27, 2015, 11:03:07 pm »
MiTM - Man-in-the-Middle (not always an attack)
Become the MiTM for the print server and intercept the print jobs. The print server may be the printer itself or a tertiary device between end users and the printer (typically seen on an enterprise-level domain).
You aren't actually "attacking" anything. You are intercepting. This technique was used by the Russians in the early 90's to intercept weapons' blueprints that were being sent over the wire from a US military base in the UK to a US-based large-scale printer. They intercepted the traffic on the wire, duplicated it and allowed it to pass through. No one questioned why the print jobs were taking 5 minutes longer than usual, especially when sending over telecoms.