{% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte)
Support HackTricks * Check the [**subscription plans**](https://github.com/sponsors/carlospolop)! * **Join the** πŸ’¬ [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.** * **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
{% endhint %} # 인터넷 인쇄 ν”„λ‘œν† μ½œ \(IPP\) **인터넷 인쇄 ν”„λ‘œν† μ½œ (IPP)**λŠ” **RFC2910** 및 **RFC2911**에 λͺ…μ‹œλœ 바와 같이 인터넷을 ν†΅ν•œ μΈμ‡„μ˜ κΈ°μ΄ˆκ°€ λ©λ‹ˆλ‹€. **IPP Everywhere**와 같은 λ°œμ „μ€ λͺ¨λ°”일 및 ν΄λΌμš°λ“œ 인쇄λ₯Ό ν‘œμ€€ν™”ν•˜λŠ” 것을 λͺ©ν‘œλ‘œ ν•˜λ©°, **3D 인쇄**λ₯Ό μœ„ν•œ ν™•μž₯ κΈ°λŠ₯의 λ„μž…μœΌλ‘œ IPP의 ν™•μž₯ κ°€λŠ₯성을 λ³΄μ—¬μ€λ‹ˆλ‹€. **HTTP** ν”„λ‘œν† μ½œμ„ ν™œμš©ν•˜μ—¬ IPPλŠ” **κΈ°λ³Έ/λ‹€μ΄μ œμŠ€νŠΈ 인증** 및 **SSL/TLS μ•”ν˜Έν™”**와 같은 ν™•λ¦½λœ λ³΄μ•ˆ κ΄€ν–‰μ˜ ν˜œνƒμ„ λˆ„λ¦½λ‹ˆλ‹€. 인쇄 μž‘μ—… μ œμΆœμ΄λ‚˜ ν”„λ¦°ν„° μƒνƒœ μ‘°νšŒμ™€ 같은 μž‘μ—…μ€ **HTTP POST μš”μ²­**을 톡해 IPP μ„œλ²„μ— μ „λ‹¬λ˜λ©°, 이 μ„œλ²„λŠ” **포트 631/tcp**μ—μ„œ μš΄μ˜λ©λ‹ˆλ‹€. IPP의 잘 μ•Œλ €μ§„ κ΅¬ν˜„μ²΄λŠ” **CUPS**둜, λ‹€μ–‘ν•œ λ¦¬λˆ…μŠ€ 배포판과 OS Xμ—μ„œ 널리 μ‚¬μš©λ˜λŠ” μ˜€ν”ˆ μ†ŒμŠ€ 인쇄 μ‹œμŠ€ν…œμž…λ‹ˆλ‹€. μœ μš©μ„±μ—λ„ λΆˆκ΅¬ν•˜κ³ , IPPλŠ” LPD와 μœ μ‚¬ν•˜κ²Œ **PostScript** λ˜λŠ” **PJL 파일**을 톡해 μ•…μ„± μ½˜ν…μΈ λ₯Ό μ „μ†‘ν•˜λŠ” 데 μ•…μš©λ  수 μžˆμ–΄ 잠재적인 λ³΄μ•ˆ μœ„ν—˜μ„ κ°•μ‘°ν•©λ‹ˆλ‹€. ```python # Example of sending an IPP request using Python import requests url = "http://printer.example.com:631/ipp/print" headers = {"Content-Type": "application/ipp"} data = b"..." # IPP request data goes here response = requests.post(url, headers=headers, data=data, verify=True) print(response.status_code) ``` If you want to learn more about [**ν”„λ¦°ν„° 해킹에 λŒ€ν•΄ μ•Œμ•„λ³΄λ €λ©΄ 이 νŽ˜μ΄μ§€λ₯Ό μ½μ–΄λ³΄μ„Έμš”**](http://hacking-printers.net/wiki/index.php/Main_Page). {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte)
Support HackTricks * Check the [**ꡬ독 κ³„νš**](https://github.com/sponsors/carlospolop)! * **Join the** πŸ’¬ [**Discord κ·Έλ£Ή**](https://discord.gg/hRep4RUj7f) or the [**ν…”λ ˆκ·Έλž¨ κ·Έλ£Ή**](https://t.me/peass) or **follow** us on **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.** * **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
{% endhint %}