It still surprises me to see how many things you can find that are not password protected. A couple of years ago Screamer found some Printers that were not password protected and we played around with them. You can change all kinds of shit on them but they were still just printers. Actually Screamer got an article about that published in 2600 (an me an unreal got shoutouts woot!). But recently I've been doing a lot of scanning and I came up with all kinds of shit that was not password protected. Jus let nmap search the web randomly for a few hours for port 80 or 23 and you'll see what I mean. (nmap -sS -r -iR 0 -p 23,80) A lot of the new devices that you buy nowadays like printers, routers, wireless routers, webcams, etc. come with webservers on them. Some devices might still use telnet (hence searching for port 23). But a majority of devices have web servers installed rite on them and activated by default. Most people who go to bestbuy to get a router so they can share internet on two computers will be happy to get it to work and won't worry but security. If you scan subnets of ISPs you will come across a ton of routers and modems. Defaults passwords are readily available ( All this is cool an all but why mess around with routers and printers? If you're asking yourself that you might not know some of the things they do nowadays. Some printers out there have memory which you can use to store files that can incriminate you sure as, source code to a virus, CC numbers, etc. Routers can come in handy too. The more you scan around the more fun things you will find. Don't believe me? Then I might be forced to DoS you of the net with my T1 line which I control now cause I found a device (Vina Tech elink 216) that was not password protected and allows pings (you can select the number of times and packet size) and traceroutes to be performed rite through their nice web-based GUI. As you can see, scanning around for these devices can have some rewards.