PRETty : “PRinter Exploitation Toolkit” LAN Automation Tool

PRETty is useful when a large number of printers are present on a network. Instead of scanning, logging, and manually running PRET against each individual printer, it will automatically discover and run chosen PRET payloads against all printers on the target network.

Additionally, it can be used to automate command/payload delivery to any given list of printers.

Also Read : Kube-Hunter:Hunt For Security Weaknesses In Kubernetes Clusters

Installation

Install PRET and all required dependencies

sudo pip install -U argparse termcolor
sudo apt -y install arp-scan tshark

Navigate to where you installed PRET

cd PRET

Install it into PRET:

git clone https://github.com/BusesCanFly/PRETty

Navigate to it

cd PRETty

Make it executable

chmod +x PRETty.py

  • One line variant (from PRET folder):

sudo apt -y install arp-scan tshark
sudo pip install -U argparse termcolor
git clone https://github.com/BusesCanFly/PRETty
cd PRETty && chmod +x PRETty.py

  • One line variant w/ PRET installation:

sudo apt -y install imagemagick ghostscript arp-scan tshark
sudo pip install -U argparse termcolor colorama pysnmp
git clone https://github.com/RUB-NDS/PRET
cd PRET
git clone https://github.com/BusesCanFly/PRETty
cd PRETty
chmod +x PRETty.py

Lists

  • It automatically scans the LAN for HP/Brother/Kyocera printers and creates an IP list for itself
    • However, you can place custom IP lists in PRETty/IP/
  • It comes with pre-made command list files for PRET located in PRETty/commands/
    • However, you can place additional command list files in PRETty/commands/

Usage

  • Run it with ./PRETty.py and follow the prompts 😀
  • For more advanced users, run ./PRETty.py -h
    • ./PRETty.py --cli enables CLI mode. (No user input required)
    • The default ./PRETty.py --cli will scan the current LAN, and run ./commands/pret_pagecount.txt on every printer found
    • (optional) Additional arguments are: -r [IP range to scan] -c [Name of command list file to use] -s [PRET shell type]
R K

Recent Posts

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

8 hours ago

This Android Bug Can Crack Your Lock Screen in 60 Seconds

A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…

4 days ago

How to Fix MyISAM Table Corruption in MySQL?

In MySQL Server 5.5 and earlier versions, the MyISAM was the default storage engine. So,…

5 days ago

Microsoft Authenticator Flaw Could Leak Login Codes

A newly disclosed vulnerability in Microsoft Authenticator could expose one time sign in codes or…

5 days ago

Modrinth – A Comprehensive Overview of Tools and Functions

Modrinth is a modern platform that’s rapidly changing the landscape of Minecraft modding, providing an…

6 days ago

BlackSanta Malware A Stealthy Threat Targeting Recruiters and HR Teams

A new, highly sophisticated malware campaign named BlackSanta has emerged, primarily targeting HR and recruitment…

6 days ago