Skip to content

Latest commit

 

History

History
40 lines (27 loc) · 1.91 KB

Readme.md

File metadata and controls

40 lines (27 loc) · 1.91 KB

Exploiting Printers (Kyocera)

This script would assisst in a pentest scenario to abuse a printer feature found in Kyocera printers to gain access to windows credentials. Kyocera Printers contain an address book feature; within this feature an administrator can use one of two methods to transmit scanned documents:

  • Configure a send to e-mail.
  • Configure a windows account to login to the host and scan to an SMB folder.

Tested on:

  • Kyocera ECOSYS M2640idw
  • Kyocera 4550i

Setup

Quite simple really you can compile with the csc.exe utility in your dotnet framework.

  • Navigate <path/to/csc.exe> KyoceraAddressBookDecryptor.cs

an example is below: C:\Windows\Microsoft.NET\Framework64\v3.5\csc.exe KyoceraAddressBookDecryptor.cs

You also need to download KNetViewer to be able to export the addressbook from the printer as it is the Network management tool for Kyocera Printers to perform maintenance operations on local and remote printers.

Pre-compiled binary for the decryptor provided just incase you're pressed for time. :-P

usage

  • Navigate to the path where you have saved this exe
  • run KyoceraAddressBookDecryptor.exe
  • paste the encrypted value from the SmbLoginPasswd field in the Address Book XML.

A sample of the address book is below:

Address Book Sample

The decryption process is as easy as below:

Using The Decryptor

Presumed Threat Model

Sample Threat Model

End