ron
13bb98b8b8
Bring in changes from my experimental brange, nmap-http
2010-10-27 03:08:08 +00:00
david
a9b75892f5
Use shortport.http where appropriate.
2010-08-09 22:30:50 +00:00
david
bccb8ead89
Edit some script descriptions for better line breaks when rendered as
...
PDF. Some long URLs were replaced by short redirects under
http://nmap.org/r/ .
2010-07-17 16:47:31 +00:00
david
b9633ed69b
Do copyediting of NSEDoc. This is a first pass up to ms-sql-xp-cmdshell.
2010-07-09 23:32:18 +00:00
david
752fd5331b
Use http.generic_request in http-iis-webdav-vuln.nse.
2010-02-19 05:03:00 +00:00
david
a3a7d79b5f
Update some SecLists URLs.
2010-02-11 17:43:02 +00:00
david
ba5f5644cb
Remove some non-NSEDoc markup that was breaking a link.
2010-02-11 05:05:44 +00:00
ron
96a390203c
Updated http-iis-webdav-vuln.nse to run against SSL-enabled servers
2009-12-08 17:29:43 +00:00
fyodor
77ab5c4305
Remove email addresses from scripts as discussed in this thread: http://seclists.org/nmap-dev/2009/q4/466
2009-11-24 08:49:02 +00:00
ron
7604ec68e2
Updated http-iis-webdav-vuln.nse: gives less output by default (unless -v or -d is given). Also updated it to reflect Microsoft's MS09-020 bulletin.
2009-06-11 21:57:42 +00:00
ron
ab59b09c03
Miscellaneous code cleanups in my smb-* libraries/scripts (removed unused includes, old debug code, etc.)
2009-06-10 23:13:15 +00:00
fyodor
d971be11a8
Add links to some other sources of information on the vulnerability and this script
2009-05-22 19:59:07 +00:00
ron
bfd3c5b3df
Fixed the 'usage' section -- thanks to Raul Siles for pointing out the mistake
2009-05-22 12:35:59 +00:00
ron
db4b1df6d1
Fixed a nil-reference bug in the WebDAV code
2009-05-21 19:49:53 +00:00
ron
4d38f8c8c5
Fixed a spelling mistake on print_debug ('pring_debug')
2009-05-21 14:35:23 +00:00
ron
9f21ec234c
Applied a patch to WebDAV checks created by Andrew Orr:
...
1) Checks if the root folder is protected and aborts if it is (we can't scan folders if the root folder is protected)
2) Checks if WebDAV is enabled on the server and aborts if it isn't. The check works on IIS 5, 5.1, and 6.0 (hasn't been tested on others)
3) Added support for finding the vulnerability on IIS 5.1 (Windows XP) -- 5.0 doesn't appear to be vulnerable in our tests
2009-05-20 18:44:01 +00:00
fyodor
d3e623bf00
change the categories to vuln and intrusive
2009-05-20 00:51:54 +00:00
fyodor
4599d9f4f5
rename http-webdav-unicode-bypass.nse to http-iis-webdav-vuln.nse and update script.db
2009-05-20 00:43:30 +00:00