Login Register






The stories and information posted here are artistic works of fiction and falsehood. Only a fool would take anything posted here as fact.
Thread Rating:
  • 0 Vote(s) - 0 Average


Way to exploit the given list of vulns.? filter_list
Author
Message
Way to exploit the given list of vulns.? #1
Following are the result shown while scanning a target for vulnerabilities :

+ Target IP: 72.18.13x.xx
+ Target Hostname: www.xxxxxxxxxxxx.com
+ Target Port: 80
+ Start Time: 2013-04-04 19:18:20
---------------------------------------------------------------------------
+ Server: Microsoft-IIS/6.0

+ Retrieved x-powered-by header: ASP.NET
+ Retrieved x-aspnet-version header: 2.0.50727
+ Root page / redirects to: /site/default.aspx
+ Microsoft-IIS/6.0 appears to be outdated (4.0 for NT 4, 5.0 for Win2k, current is at least 7.5)
+ Retrieved dasl header: <DAVConfusedql>
+ Retrieved dav header: 1, 2
+ Retrieved ms-author-via header: DAV
+ Allowed HTTP Methods: OPTIONS, TRACE, GET, HEAD, DELETE, PUT, POST, COPY, MOVE, MKCOL, PROPFIND, PROPPATCH, LOCK, UNLOCK, SEARCH
+ OSVDB-5646: HTTP method ('Allow' Header): 'DELETE' may allow clients to remove files on the web server.
+ OSVDB-397: HTTP method ('Allow' Header): 'PUT' method could allow clients to save files on the web server.
+ OSVDB-5647: HTTP method ('Allow' Header): 'MOVE' may allow clients to change file locations on the web server.
+ Public HTTP Methods: OPTIONS, TRACE, GET, HEAD, DELETE, PUT, POST, COPY, MOVE, MKCOL, PROPFIND, PROPPATCH, LOCK, UNLOCK, SEARCH
+ OSVDB-5646: HTTP method ('Public' Header): 'DELETE' may allow clients to remove files on the web server.
+ OSVDB-397: HTTP method ('Public' Header): 'PUT' method could allow clients to save files on the web server.
+ OSVDB-5647: HTTP method ('Public' Header): 'MOVE' may allow clients to change file locations on the web server.
+ WebDAV enabled (SEARCH UNLOCK LOCK MKCOL COPY PROPPATCH PROPFIND listed as allowed)

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Now my question is :

Is there anyone who can guide me through the process of exploting this website.
I tried using netcat and telnet but it was of no use i think first time this displayed a lot of info when i tried OPTIONS / HTTP/1.1. but now it isn't showing anything and just exits.


[Image: cooltext980231940.gif]

Reply

RE: Way to exploit the given list of vulns.? #2
just google for the exploit for ex : " OSVDB-397 exploit " in this case you will get this http://www.metasploit.com/modules/exploi...upload_asp or for " OSVDB-5647 exploit " u will get http://www.exploit-db.com/exploits/5647/ .... just try the others Smile

hope this helped u Smile

Reply

RE: Way to exploit the given list of vulns.? #3
How to use these exploits?
[Image: cooltext980231940.gif]

Reply

RE: Way to exploit the given list of vulns.? #4
I would suggest using metasploit.



Reply







Users browsing this thread: 2 Guest(s)