![]() |
Way to exploit the given list of vulns.? - Printable Version +- Sinisterly (https://sinister.ly) +-- Forum: Hacking (https://sinister.ly/Forum-Hacking) +--- Forum: Website & Server Hacking (https://sinister.ly/Forum-Website-Server-Hacking) +--- Thread: Way to exploit the given list of vulns.? (/Thread-Way-to-exploit-the-given-list-of-vulns) |
Way to exploit the given list of vulns.? - virusreloaded - 04-03-2013 Following are the result shown while scanning a target for vulnerabilities : + Target IP: 72.18.13x.xx + Target Hostname: www.xxxxxxxxxxxx.com + Target Port: 80 + Start Time: 2013-04-04 19:18:20 --------------------------------------------------------------------------- + Server: Microsoft-IIS/6.0 + Retrieved x-powered-by header: ASP.NET + Retrieved x-aspnet-version header: 2.0.50727 + Root page / redirects to: /site/default.aspx + Microsoft-IIS/6.0 appears to be outdated (4.0 for NT 4, 5.0 for Win2k, current is at least 7.5) + Retrieved dasl header: <DAV ![]() + Retrieved dav header: 1, 2 + Retrieved ms-author-via header: DAV + Allowed HTTP Methods: OPTIONS, TRACE, GET, HEAD, DELETE, PUT, POST, COPY, MOVE, MKCOL, PROPFIND, PROPPATCH, LOCK, UNLOCK, SEARCH + OSVDB-5646: HTTP method ('Allow' Header): 'DELETE' may allow clients to remove files on the web server. + OSVDB-397: HTTP method ('Allow' Header): 'PUT' method could allow clients to save files on the web server. + OSVDB-5647: HTTP method ('Allow' Header): 'MOVE' may allow clients to change file locations on the web server. + Public HTTP Methods: OPTIONS, TRACE, GET, HEAD, DELETE, PUT, POST, COPY, MOVE, MKCOL, PROPFIND, PROPPATCH, LOCK, UNLOCK, SEARCH + OSVDB-5646: HTTP method ('Public' Header): 'DELETE' may allow clients to remove files on the web server. + OSVDB-397: HTTP method ('Public' Header): 'PUT' method could allow clients to save files on the web server. + OSVDB-5647: HTTP method ('Public' Header): 'MOVE' may allow clients to change file locations on the web server. + WebDAV enabled (SEARCH UNLOCK LOCK MKCOL COPY PROPPATCH PROPFIND listed as allowed) ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ Now my question is : Is there anyone who can guide me through the process of exploting this website. I tried using netcat and telnet but it was of no use i think first time this displayed a lot of info when i tried OPTIONS / HTTP/1.1. but now it isn't showing anything and just exits. RE: Way to exploit the given list of vulns.? - cracker_team_mybb_import7369 - 04-05-2013 just google for the exploit for ex : " OSVDB-397 exploit " in this case you will get this http://www.metasploit.com/modules/exploit/windows/iis/iis_webdav_upload_asp or for " OSVDB-5647 exploit " u will get http://www.exploit-db.com/exploits/5647/ .... just try the others ![]() hope this helped u ![]() RE: Way to exploit the given list of vulns.? - virusreloaded - 04-06-2013 How to use these exploits? RE: Way to exploit the given list of vulns.? - 3r3bus - 04-07-2013 I would suggest using metasploit. |