"PRinter Exploitation Toolkit" LAN automation tool (It's just a python wrapper for PRET... actually it's really just a for loop)
PRETty is useful when a large number of printers are present on a network. Instead of scanning, logging, and manually running PRET againt each individual printer, PRETty will automatically discover and run choosen PRET payloads against all printers on the target network.
Additionally, PRETty can be used to automate command/payload delivery to any given list of printers (See the "Lists" section)
One line w/ PRET installation: sudo apt -y install imagemagick ghostscript arp-scan tshark && sudo pip install -U argparse termcolor colorama pysnmp && git clone https://github.com/RUB-NDS/PRET && cd PRET && git clone https://github.com/BusesCanFly/PRETty && cd PRETty && chmod +x PRETty.py
- PRETty automatically scans the LAN for HP/Brother/Kyocera printers and creates an IP list for itself
- However, you can place custom IP lists in
PRETty/IP/
- However, you can place custom IP lists in
- PRETty comes with pre-made command list files for PRET located in
PRETty/commands/- However, you can place additional command list files in
PRETty/commands/
- However, you can place additional command list files in
- Run PRETty with
./PRETty.pyand follow the prompts :D - For more advanced users, run
./PRETty.py -h./PRETty.py --clienables CLI mode. (No user input required)- The default
./PRETty.py --cliwill scan the current LAN, and run./commands/pret_pagecount.txton every printer found - (optional) Additional arguments are:
-r [IP range to scan] -c [Name of command list file to use] -s [PRET shell type]
