PRET

From Hacking Printers
Revision as of 16:37, 31 January 2017 by Admin (Talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

The PRinter Exploitation Toolkit (PRET) is a Python tool developed at the University of Bochum to automate most attacks presented in this wiki. It connects to a printing device via network or USB and allows penetration testers to exploit a large variety of bugs and features in PostScript, PJL and PCL, including temporary and physical denial of service attacks, resetting the device to factory defaults, print job manipulation and retention, access to a printer's memory and file system as well as password cracking.

External links