We covered again printer exploitation methods and this time we used a machine that has printer installed and can be accessed through the web browser. The printer has an input box through which we were able to enter PJL commands to interact with its filesystem and extract sensitive files. This was part of Intro to printer exploitation track in HackTheBox

Get Reverse Shell Notes

Video Walkthrough

Video walkthrough for HackTheBox Wander is coming soon.

About the Author

I create cybersecurity notes, digital marketing notes and online courses. I also provide digital marketing consulting including but not limited to SEO, Google & Meta ads and CRM administration.

View Articles