-
Notifications
You must be signed in to change notification settings - Fork 0
BrianWGray/msf
Folders and files
| Name | Name | Last commit message | Last commit date | |
|---|---|---|---|---|
Repository files navigation
Brian W. Gray # Eaton Eaton Power Expert meter private key exposure. https://www.ctrlu.net/vuln/0006.html http://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/PXM-Advisory.pdf # PJL PJL: the PJL series of msf scripts are my work in progress to build printer modules to scan for PJL enabled printers brute force the PJL password on the printer if necessary. several options are being worked on. 1. Parse through the printers file systems looking for files of interest .pdf etc. re-configure multifunction printers to save scan/print jobs locally if the options are available so that documents and automatically download any available files. 2. Once a PJL printer and password has been determined open a PJL sudo shell session within Metasploit. These functions are based off of personal research, trial, error, and code from phenoelit and Matt at attackvector. http://www.phenoelit-us.org/fr/tools.html http://www.attackvector.org/fun-with-printers-part-3/
About
msf modules
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published