We covered again printer exploitation methods and this time we used a machine that has printer installed and can be accessed through the web browser. The printer has an input box through which we were able to enter PJL commands to interact with its filesystem and extract sensitive files. This was part of Intro to printer exploitation track in HackTheBox

Get Reverse Shell Notes

Video Walkthrough

About the Author

Cybersecurity Trainer MS in Cybersecurity Expertise in Healthcare and Finance Industries Penetration tester and compliance auditor

View Articles