Nmap Development mailing list archives
Re: Scanning for WebDAV vulns
From: Thierry Zoller <Thierry () Zoller lu>
Date: Wed, 20 May 2009 11:26:42 +0200
Hi Ron, Thanks, you might want to have an option to check for write access, on some strange setups this might actually happen. R> Hi all, R> I've implemented an Nmap script based on Metasploit's auxiliary module R> that checks servers for the WebDAV vulnerability by bruteforcing for a R> retricted folder name and trying to get access. I've checked it in to R> the Nmap trunk, so feel free to download/compile/run it. R> I've written a blog that has a lot more detail about how to R> download/compile/run it, as well as what the script does and how it R> works. Check it out: R> http://www.skullsecurity.org/blog/?p=271 R> Fyodor updated the NSEDoc documentation, have a look here: R> http://nmap.org/nsedoc/scripts/http-iis-webdav-vuln.html R> Let me know what you think! -- http://blog.zoller.lu Thierry Zoller _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://SecLists.Org
Current thread:
- Scanning for WebDAV vulns Ron (May 19)
- Re: Scanning for WebDAV vulns Ron (May 20)
- Re: Scanning for WebDAV vulns Thomas Buchanan (May 20)
- Re: Scanning for WebDAV vulns Ron (May 21)
- Re: Scanning for WebDAV vulns Thomas Buchanan (May 20)
- Re: Scanning for WebDAV vulns Thierry Zoller (May 20)
- Re: Scanning for WebDAV vulns Ron (May 20)
- Re: Scanning for WebDAV vulns Ron (May 20)
- Re[2]: Scanning for WebDAV vulns Thierry Zoller (May 21)
- Re: Scanning for WebDAV vulns Ron (May 20)
- Re: Scanning for WebDAV vulns Ron (May 20)
