HOME>>>>>>>>>

File ajp-methods

脚本使用类型: portrule
脚本所属分类: default, safe
脚本下载地址: http://nmap.org/svn/scripts/ajp-methods.nse

User Summary

Discovers which options are supported by the AJP (Apache JServ Protocol) server by sending an OPTIONS request and lists potentially risky methods.

In this script, "potentially risky" methods are anything except GET, HEAD, POST, and OPTIONS. If the script reports potentially risky methods, they may not all be security risks, but you should check to make sure. This page lists the dangers of some common methods:

http://www.owasp.org/index.php/Testing_for_HTTP_Methods_and_XST_%28OWASP-CM-008%29

Script Arguments

ajp-methods.path

the path to check or <code>/<code> if none was given

smbdomain, smbhash, smbnoguest, smbpassword, smbtype, smbusername

See the documentation for the smbauth library.

http.max-cache-size, http.max-pipeline, http.pipeline, http.useragent

See the documentation for the http library.

Example Usage

执行格式

nmap -p 8009 <ip> --script ajp-methods

Script Output

PORT     STATE SERVICE
8009/tcp open  ajp13
| ajp-methods: 
|   Supported methods: GET HEAD POST PUT DELETE TRACE OPTIONS
|   Potentially risky methods: PUT DELETE TRACE
|_  See http://nmap.org/nsedoc/scripts/ajp-methods.html

Requires


Author: Patrik Karlsson

License: VER007 整理 http://www.ver007.com