Printer Exploitation via SNMP and Telnet | CTF Walkthrough
In this video walk-through, we covered a printer exploitation scenario where we started with telnet protocol then we used SNMP to grab the hex representation of the password through a vulnerability that targeted HP JetDirect printers. We got a telnet shell and from there we used the available commands to spawn a reverse shell along with Metasploit. We discovered a local printing service running on port 631 which as a vulnerability that enables full ability to read any file on the target system. We used Metasploit portforwarding to be able to access and interact with this service (CUPS 1.6.1) *************** Receive Cyber Security Field Notes and Special Training Videos https://www.youtube.com/channel/UCNSdU_1ehXtGclimTVckHmQ/join ********** Resources Writeup https://motasem-notes.net/printer-exploitation-via-snmp-and-telnet-hackthebox-antique/ HackTheBox Antique https://app.hackthebox.com/machines/400 CUPS 1.6.1 Vulnerability https://www.rapid7.com/db/modules/post/multi/escalate/cups_root_file_read/ Getting a JetDirect password remotely using the SNMP vulnerability http://www.irongeek.com/i.php?page=security/networkprinterhacking ******** Patreon https://www.patreon.com/motasemhamdan?fan_landing=true Instagram https://www.instagram.com/dev.stuxnet/ Twitter https://twitter.com/ManMotasem Facebook https://www.facebook.com/motasemhamdantty/ LinkedIn [1]: https://www.linkedin.com/in/motasem-hamdan-7673289b/ [2]: https://www.linkedin.com/in/motasem-eldad-ha-bb42481b2/ Website https://www.motasem-notes.net Backup channel https://www.youtube.com/channel/UCF2AfcPUjr7r8cYuMvyRTTQ My Movie channel: https://www.youtube.com/channel/UCilElKPoXEaAfMf0bgH2pzA ******
Download
0 formatsNo download links available.