Compromised Network Printer
Level: Easy
Challenge : Compromised Network Printer
Q1: Identify the port scan activity performed by the attacker on the network. What was the NAT IP Address(Internal IP Address) assigned to the machine being used by the attacker on the internal network?

Q2: Which ports were open on the network printer? Identify the port used for printer exploitation.


Q3: Based on the abused port number, which printer language/method was being abused by the attacker for unattended malicious activity on the network printer?
Q4: Which Printer Name/Model was attacked?
Q5: The attacker has discovered a scheduled print job that is associated with an employee who is suspected of being an insider threat. What is the full path of the print job file?

Q6: What is the name of the targeted organization?
Q7: The attacker found information about RDP within the internal network. What is the directory path where this sensitive information was located?



Q8: What is the IP address of the Jumphost?

Q9: What is the filename of the PowerShell script used by admins which was also found by the attacker?

Last updated