Sinisterly
Way to exploit the given list of vulns.? - Printable Version

+- Sinisterly (https://sinister.ly)
+-- Forum: Hacking (https://sinister.ly/Forum-Hacking)
+--- Forum: Website & Server Hacking (https://sinister.ly/Forum-Website-Server-Hacking)
+--- Thread: Way to exploit the given list of vulns.? (/Thread-Way-to-exploit-the-given-list-of-vulns)



Way to exploit the given list of vulns.? - virusreloaded - 04-03-2013

Following are the result shown while scanning a target for vulnerabilities :

+ Target IP: 72.18.13x.xx
+ Target Hostname: www.xxxxxxxxxxxx.com
+ Target Port: 80
+ Start Time: 2013-04-04 19:18:20
---------------------------------------------------------------------------
+ Server: Microsoft-IIS/6.0

+ Retrieved x-powered-by header: ASP.NET
+ Retrieved x-aspnet-version header: 2.0.50727
+ Root page / redirects to: /site/default.aspx
+ Microsoft-IIS/6.0 appears to be outdated (4.0 for NT 4, 5.0 for Win2k, current is at least 7.5)
+ Retrieved dasl header: <DAVConfusedql>
+ Retrieved dav header: 1, 2
+ Retrieved ms-author-via header: DAV
+ Allowed HTTP Methods: OPTIONS, TRACE, GET, HEAD, DELETE, PUT, POST, COPY, MOVE, MKCOL, PROPFIND, PROPPATCH, LOCK, UNLOCK, SEARCH
+ OSVDB-5646: HTTP method ('Allow' Header): 'DELETE' may allow clients to remove files on the web server.
+ OSVDB-397: HTTP method ('Allow' Header): 'PUT' method could allow clients to save files on the web server.
+ OSVDB-5647: HTTP method ('Allow' Header): 'MOVE' may allow clients to change file locations on the web server.
+ Public HTTP Methods: OPTIONS, TRACE, GET, HEAD, DELETE, PUT, POST, COPY, MOVE, MKCOL, PROPFIND, PROPPATCH, LOCK, UNLOCK, SEARCH
+ OSVDB-5646: HTTP method ('Public' Header): 'DELETE' may allow clients to remove files on the web server.
+ OSVDB-397: HTTP method ('Public' Header): 'PUT' method could allow clients to save files on the web server.
+ OSVDB-5647: HTTP method ('Public' Header): 'MOVE' may allow clients to change file locations on the web server.
+ WebDAV enabled (SEARCH UNLOCK LOCK MKCOL COPY PROPPATCH PROPFIND listed as allowed)

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Now my question is :

Is there anyone who can guide me through the process of exploting this website.
I tried using netcat and telnet but it was of no use i think first time this displayed a lot of info when i tried OPTIONS / HTTP/1.1. but now it isn't showing anything and just exits.





RE: Way to exploit the given list of vulns.? - cracker_team_mybb_import7369 - 04-05-2013

just google for the exploit for ex : " OSVDB-397 exploit " in this case you will get this http://www.metasploit.com/modules/exploit/windows/iis/iis_webdav_upload_asp or for " OSVDB-5647 exploit " u will get http://www.exploit-db.com/exploits/5647/ .... just try the others Smile

hope this helped u Smile


RE: Way to exploit the given list of vulns.? - virusreloaded - 04-06-2013

How to use these exploits?


RE: Way to exploit the given list of vulns.? - 3r3bus - 04-07-2013

I would suggest using metasploit.