Compromised Network Printer
Level: Easy
Last updated
Was this helpful?
Level: Easy
Last updated
Was this helpful?
The pcap file reveals numerous SYN packets originating from the IP address 172.31.35.23
. This activity resembles port scanning behavior.
Upon analyzing the pcap file, we observed communication between the attacker and the device with the IP address 172.31.40.241
on port 9100
. By following the TCP stream, we identified that the device is a printer.
As shown in the image above, the syntax includes "@PJL," which indicates the use of PJL (Printer Job Language).
As seen in the image above, the name of the printer was displayed.
By analyzing the TCP stream, we can observe a query from the attacker to the file system.
By reading the content of the "scheduled.ps" file, we can uncover the name of the targeted organization.
Using the hint from the question, we discovered a file named .rdp
.
By simply searching in the search bar, we can easily find information related to internal.rdp
. Following the TCP stream, we can uncover more details, as mentioned in the previous question.
By reading the content of the internal.rdp
file, the IP address of the target system is revealed.
At the end of stream 65623, a new .ps
file is revealed.