PRETty : “PRinter Exploitation Toolkit” LAN Automation Tool

PRETty is useful when a large number of printers are present on a network. Instead of scanning, logging, and manually running PRET against each individual printer, it will automatically discover and run chosen PRET payloads against all printers on the target network.

Additionally, it can be used to automate command/payload delivery to any given list of printers.

Also Read : Kube-Hunter:Hunt For Security Weaknesses In Kubernetes Clusters

Installation

Install PRET and all required dependencies

sudo pip install -U argparse termcolor
sudo apt -y install arp-scan tshark

Navigate to where you installed PRET

cd PRET

Install it into PRET:

git clone https://github.com/BusesCanFly/PRETty

Navigate to it

cd PRETty

Make it executable

chmod +x PRETty.py

  • One line variant (from PRET folder):

sudo apt -y install arp-scan tshark
sudo pip install -U argparse termcolor
git clone https://github.com/BusesCanFly/PRETty
cd PRETty && chmod +x PRETty.py

  • One line variant w/ PRET installation:

sudo apt -y install imagemagick ghostscript arp-scan tshark
sudo pip install -U argparse termcolor colorama pysnmp
git clone https://github.com/RUB-NDS/PRET
cd PRET
git clone https://github.com/BusesCanFly/PRETty
cd PRETty
chmod +x PRETty.py

Lists

  • It automatically scans the LAN for HP/Brother/Kyocera printers and creates an IP list for itself
    • However, you can place custom IP lists in PRETty/IP/
  • It comes with pre-made command list files for PRET located in PRETty/commands/
    • However, you can place additional command list files in PRETty/commands/

Usage

  • Run it with ./PRETty.py and follow the prompts 😀
  • For more advanced users, run ./PRETty.py -h
    • ./PRETty.py --cli enables CLI mode. (No user input required)
    • The default ./PRETty.py --cli will scan the current LAN, and run ./commands/pret_pagecount.txt on every printer found
    • (optional) Additional arguments are: -r [IP range to scan] -c [Name of command list file to use] -s [PRET shell type]
R K

Recent Posts

Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell

Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…

8 hours ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

9 hours ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

1 day ago

How to Bash Append to File: A Simple Guide for Beginners

If you are working with Linux or writing bash scripts, one of the most common…

1 day ago

Mastering the Bash Case Statement with Simple Examples

What is a bash case statement? A bash case statement is a way to control…

1 day ago

How to Check if a File Exists in Bash – Simply Explained

Why Do We Check Files in Bash? When writing a Bash script, you often work…

3 days ago