Pentest Cheat Sheet
1.
Scanning & Enumeration
2.
Information Gathering (Reconnaissance)
3.
Linux
3.1.
Enumeration
3.2.
Reverse Shell
3.3.
Privesc
3.4.
Buffer Overflow
3.5.
Check-list
4.
Windows
4.1.
Enumeration
4.2.
File Upload
4.3.
Buffer Overflow
4.4.
Active Directory
4.5.
Privesc
4.6.
Reverse Shell
4.7.
NTLM Hashes
4.8.
Maintaining Access
4.9.
Check-list
5.
Port Forwarding/Tunneling
6.
Brute-Force
7.
Web Applications
7.1.
Enumeration
7.2.
SQL Injection
7.3.
File Upload
7.4.
Fuzzing
7.5.
LFI
7.6.
XSS
8.
OSINT
9.
PassBack Attack
10.
Steganography
11.
MSF-Venom
12.
Wireless Penetration Testing
Light (default)
Rust
Coal
Navy
Ayu
Pentest Cheat Sheet
Passback Attack
Most Printer or other devices have weak login password but also quite often a LDAP/AD connection. Login to printer - changing LDAP Server to your Listener and catch username and password.
With creditials you can go further in the network.
Netcat or Responder could work as target server
Further Information
https://www.mindpointgroup.com/blog/how-to-hack-through-a-pass-back-attack
http://foofus.net/goons/percx/praeda/pass-back-attack.pdf
https://medium.com/r3d-buck3t/pwning-printers-with-ldap-pass-back-attack-a0d8fa495210