Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.Sign up
Fetching latest commit…
Cannot retrieve the latest commit at this time.
|Failed to load latest commit information.|
Brian W. Gray # Eaton Eaton Power Expert meter private key exposure. https://www.ctrlu.net/vuln/0006.html http://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/PXM-Advisory.pdf # PJL PJL: the PJL series of msf scripts are my work in progress to build printer modules to scan for PJL enabled printers brute force the PJL password on the printer if necessary. several options are being worked on. 1. Parse through the printers file systems looking for files of interest .pdf etc. re-configure multifunction printers to save scan/print jobs locally if the options are available so that documents and automatically download any available files. 2. Once a PJL printer and password has been determined open a PJL sudo shell session within Metasploit. These functions are based off of personal research, trial, error, and code from phenoelit and Matt at attackvector. http://www.phenoelit-us.org/fr/tools.html http://www.attackvector.org/fun-with-printers-part-3/