PRETty is useful when a large number of printers are present on a network. Instead of scanning, logging, and manually running PRET against each individual printer, it will automatically discover and run chosen PRET payloads against all printers on the target network.
Additionally, it can be used to automate command/payload delivery to any given list of printers.
Also Read : Kube-Hunter:Hunt For Security Weaknesses In Kubernetes Clusters
Installation
Install PRET and all required dependencies
sudo pip install -U argparse termcolor
sudo apt -y install arp-scan tshark
Navigate to where you installed PRET:
cd PRET
Install it into PRET:
git clone https://github.com/BusesCanFly/PRETty
Navigate to it
cd PRETty
Make it executable
chmod +x PRETty.py
sudo apt -y install arp-scan tshark
sudo pip install -U argparse termcolor
git clone https://github.com/BusesCanFly/PRETty
cd PRETty && chmod +x PRETty.py
sudo apt -y install imagemagick ghostscript arp-scan tshark
sudo pip install -U argparse termcolor colorama pysnmp
git clone https://github.com/RUB-NDS/PRET
cd PRET
git clone https://github.com/BusesCanFly/PRETty
cd PRETty
chmod +x PRETty.py
PRETty/IP/
PRETty/commands/
PRETty/commands/
./PRETty.py
and follow the prompts 😀./PRETty.py -h
./PRETty.py --cli
enables CLI mode. (No user input required)./PRETty.py --cli
will scan the current LAN, and run ./commands/pret_pagecount.txt
on every printer found-r [IP range to scan] -c [Name of command list file to use] -s [PRET shell type]
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…
Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…