515 - Pentesting Line Printer Daemon (LPD)
Last updated
Last updated
Learn & practice AWS Hacking: Learn & practice GCP Hacking:
In the 1980s, the Line Printer Daemon (LPD) protocol was developed in Berkeley Unix, which later became formalized through RFC1179. This protocol operates over port 515/tcp, allowing interactions through the lpr
command. The essence of printing via LPD involves sending a control file (to specify job details and user) along with a data file (which holds the print information). While the control file allows the selection of various file formats for the data file, the handling of these files is determined by the specific LPD implementation. A widely recognized implementation for Unix-like systems is LPRng. Notably, the LPD protocol can be exploited to execute malicious PostScript or PJL print jobs.
introduces two essential tools, lpdprint
and lpdtest
, offering a straightforward method to interact with LPD-compatible printers. These tools enable a range of actions from printing data to manipulating files on the printer, such as downloading, uploading, or deleting:
port 515
For individuals interested in further exploring the realm of printer hacking, a comprehensive resource can be found here: .
Learn & practice AWS Hacking: Learn & practice GCP Hacking:
Check the !
Join the 💬 or the or follow us on Twitter 🐦 .
Share hacking tricks by submitting PRs to the and github repos.