PRETty : “PRinter Exploitation Toolkit” LAN Automation Tool

PRETty is useful when a large number of printers are present on a network. Instead of scanning, logging, and manually running PRET against each individual printer, it will automatically discover and run chosen PRET payloads against all printers on the target network.

Additionally, it can be used to automate command/payload delivery to any given list of printers.

Also Read : Kube-Hunter:Hunt For Security Weaknesses In Kubernetes Clusters

Installation

Install PRET and all required dependencies

sudo pip install -U argparse termcolor
sudo apt -y install arp-scan tshark

Navigate to where you installed PRET

cd PRET

Install it into PRET:

git clone https://github.com/BusesCanFly/PRETty

Navigate to it

cd PRETty

Make it executable

chmod +x PRETty.py

  • One line variant (from PRET folder):

sudo apt -y install arp-scan tshark
sudo pip install -U argparse termcolor
git clone https://github.com/BusesCanFly/PRETty
cd PRETty && chmod +x PRETty.py

  • One line variant w/ PRET installation:

sudo apt -y install imagemagick ghostscript arp-scan tshark
sudo pip install -U argparse termcolor colorama pysnmp
git clone https://github.com/RUB-NDS/PRET
cd PRET
git clone https://github.com/BusesCanFly/PRETty
cd PRETty
chmod +x PRETty.py

Lists

  • It automatically scans the LAN for HP/Brother/Kyocera printers and creates an IP list for itself
    • However, you can place custom IP lists in PRETty/IP/
  • It comes with pre-made command list files for PRET located in PRETty/commands/
    • However, you can place additional command list files in PRETty/commands/

Usage

  • Run it with ./PRETty.py and follow the prompts 😀
  • For more advanced users, run ./PRETty.py -h
    • ./PRETty.py --cli enables CLI mode. (No user input required)
    • The default ./PRETty.py --cli will scan the current LAN, and run ./commands/pret_pagecount.txt on every printer found
    • (optional) Additional arguments are: -r [IP range to scan] -c [Name of command list file to use] -s [PRET shell type]
R K

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

1 week ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

2 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

3 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

3 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

3 weeks ago