blog.includesecurity.com/2022/08/reverse-engineering-windows-drivers-part-1
Preview meta tags from the blog.includesecurity.com website.
Linked Hostnames
9- 11 links toblog.includesecurity.com
- 3 links toincludesecurity.com
- 3 links tos3.amazonaws.com
- 1 link tochannel9.msdn.com
- 1 link todeveloper.apple.com
- 1 link todocs.microsoft.com
- 1 link togithub.com
- 1 link tohelp.wework.com
Thumbnail

Search Engine Appearance
Reverse Engineering Windows Printer Drivers (Part 1) - Include Security Research Blog
Note: This is Part 1 in a series of posts discussing security analysis of printer drivers extracted and installed from public resources. This part explains how we located publicly available drivers distributed by WeWork and conducted initial analysis. Part 2 come shortly after and will cover our exploration with in-depth technical details about how Windows ... Read more
Bing
Reverse Engineering Windows Printer Drivers (Part 1) - Include Security Research Blog
Note: This is Part 1 in a series of posts discussing security analysis of printer drivers extracted and installed from public resources. This part explains how we located publicly available drivers distributed by WeWork and conducted initial analysis. Part 2 come shortly after and will cover our exploration with in-depth technical details about how Windows ... Read more
DuckDuckGo
Reverse Engineering Windows Printer Drivers (Part 1) - Include Security Research Blog
Note: This is Part 1 in a series of posts discussing security analysis of printer drivers extracted and installed from public resources. This part explains how we located publicly available drivers distributed by WeWork and conducted initial analysis. Part 2 come shortly after and will cover our exploration with in-depth technical details about how Windows ... Read more
General Meta Tags
9- titleReverse Engineering Windows Printer Drivers (Part 1) - Include Security Research Blog
- charsetUTF-8
- robotsindex, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1
- article:published_time2022-08-05T16:00:00+00:00
- article:modified_time2023-04-06T18:39:23+00:00
Open Graph Meta Tags
10og:locale
en_US- og:typearticle
- og:titleReverse Engineering Windows Printer Drivers (Part 1) - Include Security Research Blog
- og:descriptionNote: This is Part 1 in a series of posts discussing security analysis of printer drivers extracted and installed from public resources. This part explains how we located publicly available drivers distributed by WeWork and conducted initial analysis. Part 2 come shortly after and will cover our exploration with in-depth technical details about how Windows ... Read more
- og:urlhttps://blog.includesecurity.com/2022/08/reverse-engineering-windows-drivers-part-1/
Twitter Meta Tags
7- twitter:cardsummary_large_image
- twitter:creator@includesecurity
- twitter:site@includesecurity
- twitter:label1Written by
- twitter:data1Ayaz Mammadov & Nick Fox
Link Tags
40- EditURIhttps://blog.includesecurity.com/xmlrpc.php?rsd
- alternatehttps://blog.includesecurity.com/feed/
- alternatehttps://blog.includesecurity.com/comments/feed/
- alternatehttps://blog.includesecurity.com/2022/08/reverse-engineering-windows-drivers-part-1/feed/
- alternatehttps://blog.includesecurity.com/wp-json/wp/v2/posts/1273
Links
23- https://blog.includesecurity.com
- https://blog.includesecurity.com/2022/07/hunting-for-mass-assignment-vulnerabilities-using-github-codesearch-and-grep-app
- https://blog.includesecurity.com/2022/08/reverse-engineering-windows-drivers-part-1/#respond
- https://blog.includesecurity.com/2022/08/reverse-engineering-windows-drivers-part-1/?share=facebook
- https://blog.includesecurity.com/2022/08/reverse-engineering-windows-drivers-part-1/?share=twitter