While
@bl4sty
only scored a COLLISION (non-unique bug) - Peter definitely gets a boatload of STYLE POINTS for this hack on a Canon printer @ #P2OToronto #Pwn2Own

@thezdi Congrats!

First time I'm more interested by the code of the demo than the code of the exploit! Any plan to share it @blasty?

@swapgs @thezdi for sure! I will polish it soon-ish and post it after my attempt at the Lexmark tommorow. (minus all exploit-code, of course)
@blasty @swapgs @thezdi What took longer? Finding the bugs or writing the demo?
@G33KatWork @swapgs @thezdi finding bug 1 day, writing stable exploit ~2 days, coding demo 1 day, writing a debugger for dryOS that I intended to use to find less shallow bugs but that I never got round to properly using: 5 days
@G33KatWork @swapgs @thezdi the debugger is called `sdb`, scuffed debugger. it runs in a separate dryOS RTOS thread and is interfaced over TCP. it can peek/poke memory and supports "scuffed breakpoints", which are just trampoline-hooks instead of actual proper breakpoints, it works well though!
GitHub - blasty/printer-cracktro

Contribute to blasty/printer-cracktro development by creating an account on GitHub.

GitHub

@blasty @swapgs
Everything is distributed as-is, don't expect support/updates.

Wait!? You don't support your cracktros? 😤​

@G33KatWork @swapgs this is a universal disclaimer actually that I should add to any working directory I push to github
@blasty really cool Sunday reading, thank you :)