PRETty is useful when a large number of printers are present on a network. Instead of scanning, logging, and manually running PRET against each individual printer, it will automatically discover and run chosen PRET payloads against all printers on the target network.

Additionally, it can be used to automate command/payload delivery to any given list of printers.

Also Read : Kube-Hunter:Hunt For Security Weaknesses In Kubernetes Clusters

Installation

Install PRET and all required dependencies

sudo pip install -U argparse termcolor
sudo apt -y install arp-scan tshark

Navigate to where you installed PRET

cd PRET

Install it into PRET:

git clone https://github.com/BusesCanFly/PRETty

Navigate to it

cd PRETty

Make it executable

chmod +x PRETty.py

  • One line variant (from PRET folder): 

sudo apt -y install arp-scan tshark
sudo pip install -U argparse termcolor
git clone https://github.com/BusesCanFly/PRETty
cd PRETty && chmod +x PRETty.py

  • One line variant w/ PRET installation: 

sudo apt -y install imagemagick ghostscript arp-scan tshark
sudo pip install -U argparse termcolor colorama pysnmp
git clone https://github.com/RUB-NDS/PRET
cd PRET
git clone https://github.com/BusesCanFly/PRETty
cd PRETty
chmod +x PRETty.py

Lists

  • It automatically scans the LAN for HP/Brother/Kyocera printers and creates an IP list for itself
    • However, you can place custom IP lists in PRETty/IP/
  • It comes with pre-made command list files for PRET located in PRETty/commands/
    • However, you can place additional command list files in PRETty/commands/

Usage

  • Run it with ./PRETty.py and follow the prompts 😀
  • For more advanced users, run ./PRETty.py -h
    • ./PRETty.py --cli enables CLI mode. (No user input required)
    • The default ./PRETty.py --cli will scan the current LAN, and run ./commands/pret_pagecount.txt on every printer found
    • (optional) Additional arguments are: -r [IP range to scan] -c [Name of command list file to use] -s [PRET shell type]