The new technique abuses the WS-Discovery (WSD) protocol which is used by a wide array of network devices to automatically connect to one another. The WSD protocol allows devices to send user datagram ...