PRETty : “PRinter Exploitation Toolkit” LAN Automation Tool

PRETty is useful when a large number of printers are present on a network. Instead of scanning, logging, and manually running PRET against each individual printer, it will automatically discover and run chosen PRET payloads against all printers on the target network.

Additionally, it can be used to automate command/payload delivery to any given list of printers.

Also Read : Kube-Hunter:Hunt For Security Weaknesses In Kubernetes Clusters

Installation

Install PRET and all required dependencies

sudo pip install -U argparse termcolor
sudo apt -y install arp-scan tshark

Navigate to where you installed PRET

cd PRET

Install it into PRET:

git clone https://github.com/BusesCanFly/PRETty

Navigate to it

cd PRETty

Make it executable

chmod +x PRETty.py

  • One line variant (from PRET folder):

sudo apt -y install arp-scan tshark
sudo pip install -U argparse termcolor
git clone https://github.com/BusesCanFly/PRETty
cd PRETty && chmod +x PRETty.py

  • One line variant w/ PRET installation:

sudo apt -y install imagemagick ghostscript arp-scan tshark
sudo pip install -U argparse termcolor colorama pysnmp
git clone https://github.com/RUB-NDS/PRET
cd PRET
git clone https://github.com/BusesCanFly/PRETty
cd PRETty
chmod +x PRETty.py

Lists

  • It automatically scans the LAN for HP/Brother/Kyocera printers and creates an IP list for itself
    • However, you can place custom IP lists in PRETty/IP/
  • It comes with pre-made command list files for PRET located in PRETty/commands/
    • However, you can place additional command list files in PRETty/commands/

Usage

  • Run it with ./PRETty.py and follow the prompts 😀
  • For more advanced users, run ./PRETty.py -h
    • ./PRETty.py --cli enables CLI mode. (No user input required)
    • The default ./PRETty.py --cli will scan the current LAN, and run ./commands/pret_pagecount.txt on every printer found
    • (optional) Additional arguments are: -r [IP range to scan] -c [Name of command list file to use] -s [PRET shell type]
R K

Recent Posts

Microsoft Authenticator Flaw Could Leak Login Codes

A newly disclosed vulnerability in Microsoft Authenticator could expose one time sign in codes or…

8 hours ago

Modrinth – A Comprehensive Overview of Tools and Functions

Modrinth is a modern platform that’s rapidly changing the landscape of Minecraft modding, providing an…

1 day ago

BlackSanta Malware A Stealthy Threat Targeting Recruiters and HR Teams

A new, highly sophisticated malware campaign named BlackSanta has emerged, primarily targeting HR and recruitment…

1 day ago

Perplexity Launches Personal Computer Features

Perplexity has unveiled an exciting new feature, Personal Computer, which allows AI agents to seamlessly…

1 day ago

Cyberattack or Smoke and Mirrors? The Truth Behind the Alleged Dimona Nuclear Breach

In a recent cyber incident, a group named CARDINAL, associated with the label Russian Legion,…

2 days ago

Admin Panel Dorks : A Complete List of Google Dorks

Introduction Google Dorking is a technique where advanced search operators are used to uncover information…

6 days ago