n-2-me是
Chris John Riley使用python脚本编写的一个中间人攻击工具。它的工作原理是创建一个自定义的监+听+器(默认监+听9100端口)并伪装成一个打印机。它的目的是处理传入的 PCL和PostScript打印作业,保存一份副本到你的计算机上,然后再将它们转发给实际的打印机。有点像ARP欺骗,你或攻击者能够拦截整个内网打印的各种文档...
代码如下
#!/usr/bin/env python
# PRN-2-ME
#
# Chris John Riley
# blog.c22.cc
# contact [AT] c22 [DOT] cc
# 16/10/2010
#
# {Based on the proxyfuzz script from Rodrigo Marcos - http://www.theartoffuzzing.com}
# {Fuzzing elements removed}
#
# Changelog
# 0.1 --> Initial version
version = 0.01
from twisted.protocols import portforward
from twisted.internet.protocol import DatagramProtocol
from twisted.internet import reactor
import getopt, sys, re
def usage():
print '''
[ ] PRN-2-ME (PoC Printer MITM Script)
This script is designed to extract PS/PCL prints by creating a listener on a port of the users choice
(default 9100) and saving them to a file before sending on the printjob to the IP address of the real printer.
Usage .:
-l Port for the script to listen on (default: 9100)
-r IP-Address to redirct the print job to after saving to a file
-p Destination port to use when forwarding on print jobs (default: 9100)
Example .:
./prn2me.py -r 10.0.0.10
./prn2me.py -l 9101 -r 10.0.0.11 -p 9101'''
def logo():
print '''
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
(_)(_)(_)(_)_ (_)(_)(_)(_) _ (_) _ (_) _ (_)(_)(_) _ (_) _ _ (_)(_)(_)(_)(_)(_)
(_) (_)(_) (_)(_)(_)_ (_) (_) (_) (_)(_) (_)(_)(_)
(_) _ _ _(_)(_) _ _ _ (_)(_) (_)_ (_) _ _ _ _ _ _ (_) _ _ _ _ _ (_) (_)_(_) (_)(_) _ _
(_)(_)(_)(_) (_)(_)(_)(_) (_) (_)_ (_) (_)(_)(_)(_)(_) _ (_) (_)(_)(_)(_)(_) (_) (_) (_)(_)(_)(_)
(_) (_) (_) _ (_) (_)(_) _ (_) (_) (_)(_)
(_) (_) (_) _ (_) (_) _ (_) _ _ _ (_) (_)(_) _ _ _ _
(_) (_) (_)(_) (_) (_)(_)(_)(_)(_) (_) (_)(_)(_)(_)(_)(_)
+-++-++-+ +-++-++-++-+ +-++-++-++-++-++-+ +-++-++-+ +-++-++-++-++-++-++-+ +-++-+ +-++-+ - Chris John Riley -
Chris John Riley使用python脚本编写的一个中间人攻击工具。它的工作原理是创建一个自定义的监+听+器(默认监+听9100端口)并伪装成一个打印机。它的目的是处理传入的 PCL和PostScript打印作业,保存一份副本到你的计算机上,然后再将它们转发给实际的打印机。有点像ARP欺骗,你或攻击者能够拦截整个内网打印的各种文档...
代码如下
#!/usr/bin/env python
# PRN-2-ME
#
# Chris John Riley
# blog.c22.cc
# contact [AT] c22 [DOT] cc
# 16/10/2010
#
# {Based on the proxyfuzz script from Rodrigo Marcos - http://www.theartoffuzzing.com}
# {Fuzzing elements removed}
#
# Changelog
# 0.1 --> Initial version
version = 0.01
from twisted.protocols import portforward
from twisted.internet.protocol import DatagramProtocol
from twisted.internet import reactor
import getopt, sys, re
def usage():
print '''
[ ] PRN-2-ME (PoC Printer MITM Script)
This script is designed to extract PS/PCL prints by creating a listener on a port of the users choice
(default 9100) and saving them to a file before sending on the printjob to the IP address of the real printer.
Usage .:
-l Port for the script to listen on (default: 9100)
-r IP-Address to redirct the print job to after saving to a file
-p Destination port to use when forwarding on print jobs (default: 9100)
Example .:
./prn2me.py -r 10.0.0.10
./prn2me.py -l 9101 -r 10.0.0.11 -p 9101'''
def logo():
print '''
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
(_)(_)(_)(_)_ (_)(_)(_)(_) _ (_) _ (_) _ (_)(_)(_) _ (_) _ _ (_)(_)(_)(_)(_)(_)
(_) (_)(_) (_)(_)(_)_ (_) (_) (_) (_)(_) (_)(_)(_)
(_) _ _ _(_)(_) _ _ _ (_)(_) (_)_ (_) _ _ _ _ _ _ (_) _ _ _ _ _ (_) (_)_(_) (_)(_) _ _
(_)(_)(_)(_) (_)(_)(_)(_) (_) (_)_ (_) (_)(_)(_)(_)(_) _ (_) (_)(_)(_)(_)(_) (_) (_) (_)(_)(_)(_)
(_) (_) (_) _ (_) (_)(_) _ (_) (_) (_)(_)
(_) (_) (_) _ (_) (_) _ (_) _ _ _ (_) (_)(_) _ _ _ _
(_) (_) (_)(_) (_) (_)(_)(_)(_)(_) (_) (_)(_)(_)(_)(_)(_)
+-++-++-+ +-++-++-++-+ +-++-++-++-++-++-+ +-++-++-+ +-++-++-++-++-++-++-+ +-++-+ +-++-+ - Chris John Riley -