msf modules
Switch branches/tags
Nothing to show
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Failed to load latest commit information.
auxiliary/scanner
exploits/linux/ssh
README

README

Brian W. Gray

# Eaton
Eaton Power Expert meter private key exposure.
https://www.ctrlu.net/vuln/0006.html
http://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/PXM-Advisory.pdf

# PJL

PJL: the PJL series of msf scripts are my work in progress to build printer modules to scan for PJL enabled printers brute force the PJL password on the printer if necessary.

several options are being worked on.
 1. Parse through the printers file systems looking for files of interest .pdf etc. re-configure multifunction printers to save scan/print jobs locally if the options are available so that documents and automatically download any available files.

 2. Once a PJL printer and password has been determined open a PJL sudo shell session within Metasploit.

These functions are based off of personal research, trial, error, and code from phenoelit and Matt at attackvector.

http://www.phenoelit-us.org/fr/tools.html
http://www.attackvector.org/fun-with-printers-part-3/