PRETty is useful when a large number of printers are present on a network. Instead of scanning, logging, and manually running PRET against each individual printer, it will automatically discover and run chosen PRET payloads against all printers on the target network.
Additionally, it can be used to automate command/payload delivery to any given list of printers.
Also Read : Kube-Hunter:Hunt For Security Weaknesses In Kubernetes Clusters
Installation
Install PRET and all required dependencies
sudo pip install -U argparse termcolor
sudo apt -y install arp-scan tshark
Navigate to where you installed PRET:
cd PRET
Install it into PRET:
git clone https://github.com/BusesCanFly/PRETty
Navigate to it
cd PRETty
Make it executable
chmod +x PRETty.py
sudo apt -y install arp-scan tshark
sudo pip install -U argparse termcolor
git clone https://github.com/BusesCanFly/PRETty
cd PRETty && chmod +x PRETty.py
sudo apt -y install imagemagick ghostscript arp-scan tshark
sudo pip install -U argparse termcolor colorama pysnmp
git clone https://github.com/RUB-NDS/PRET
cd PRET
git clone https://github.com/BusesCanFly/PRETty
cd PRETty
chmod +x PRETty.py
PRETty/IP/
PRETty/commands/
PRETty/commands/
./PRETty.py
and follow the prompts 😀./PRETty.py -h
./PRETty.py --cli
enables CLI mode. (No user input required)./PRETty.py --cli
will scan the current LAN, and run ./commands/pret_pagecount.txt
on every printer found-r [IP range to scan] -c [Name of command list file to use] -s [PRET shell type]
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…