Difference between revisions of "PRET"

From Hacking Printers
Jump to: navigation, search
 
(2 intermediate revisions by one other user not shown)
Line 1: Line 1:
https://github.com/RUB-NDS/PRET
+
The PRinter Exploitation Toolkit (PRET) is a Python tool developed at the University of Bochum to automate most attacks presented in this wiki. It connects to a printing device via [[Port 9100 printing|network]] or [[USB]] and allows penetration testers to exploit a large variety of bugs and features in [[PostScript]], [[PJL]] and [[PCL]], including temporary and physical [[denial of service]] attacks, resetting the device to [[factory defaults]], print job [[Print job manipulation|manipulation]] and [[Print job retention|retention]], access to a printer's [[Memory access|memory]] and [[File system access|file system]] as well as [[Credential disclosure|password cracking]].
 +
 
 +
== External links ==
 +
 
 +
* [https://github.com/RUB-NDS/PRET Official website]

Latest revision as of 16:37, 31 January 2017

The PRinter Exploitation Toolkit (PRET) is a Python tool developed at the University of Bochum to automate most attacks presented in this wiki. It connects to a printing device via network or USB and allows penetration testers to exploit a large variety of bugs and features in PostScript, PJL and PCL, including temporary and physical denial of service attacks, resetting the device to factory defaults, print job manipulation and retention, access to a printer's memory and file system as well as password cracking.

External links