"PRinter Exploitation Toolkit" LAN automation tool (It's just a python wrapper for PRET... actually it's really just a for loop)
PRETty is useful when a large number of printers are present on a network. Instead of scanning, logging, and manually running PRET againt each individual printer, PRETty will automatically discover and run choosen PRET payloads against all printers on the target network.
Additionally, PRETty can be used to automate command/payload delivery to any given list of printers (See the "Lists" section)
One line w/ PRET installation: sudo apt -y install imagemagick ghostscript arp-scan tshark && sudo pip install -U argparse termcolor colorama pysnmp && git clone https://github.com/RUB-NDS/PRET && cd PRET && git clone https://github.com/BusesCanFly/PRETty && cd PRETty && chmod +x PRETty.py
- PRETty automatically scans the LAN for HP/Brother/Kyocera printers and creates an IP list for itself
- However, you can place custom IP lists in
PRETty/IP/
- However, you can place custom IP lists in
- PRETty comes with pre-made command list files for PRET located in
PRETty/commands/
- However, you can place additional command list files in
PRETty/commands/
- However, you can place additional command list files in
- Run PRETty with
./PRETty.py
and follow the prompts :D - For more advanced users, run
./PRETty.py -h
./PRETty.py --cli
enables CLI mode. (No user input required)- The default
./PRETty.py --cli
will scan the current LAN, and run./commands/pret_pagecount.txt
on every printer found - (optional) Additional arguments are:
-r [IP range to scan] -c [Name of command list file to use] -s [PRET shell type]