HOME>>>>>>>>>

File http-methods

脚本使用类型: portrule
脚本所属分类: default, safe
脚本下载地址: http://nmap.org/svn/scripts/http-methods.nse

User Summary

Finds out what options are supported by an HTTP server by sending an OPTIONS request. Lists potentially risky methods. Optionally tests each method individually to see if they are subject to e.g. IP address restrictions.

In this script, "potentially risky" methods are anything except GET, HEAD, POST, and OPTIONS. If the script reports potentially risky methods, they may not all be security risks, but you should check to make sure. This page lists the dangers of some common methods:

http://www.owasp.org/index.php/Testing_for_HTTP_Methods_and_XST_%28OWASP-CM-008%29

The list of supported methods comes from the contents of the Allow and Public header fields. In verbose mode, a list of all methods is printed, followed by the list of potentially risky methods. Without verbose mode, only the potentially risky methods are shown.

Script Arguments

http-methods.retest

If defined, do a request using each method individually and show the response code. Use of this argument can make this script unsafe; for example DELETE / is possible.

http-methods.url-path

The path to request. Defaults to /.

smbdomain, smbhash, smbnoguest, smbpassword, smbtype, smbusername

See the documentation for the smbauth library.

http.max-cache-size, http.max-pipeline, http.pipeline, http.useragent

See the documentation for the http library.

Example Usage

执行格式

nmap --script=http-methods.nse --script-args http-methods.retest=1 <target>
nmap --script=http-methods.nse --script-args http-methods.url-path=/website <target>

Script Output

80/tcp open  http
| http-methods: GET HEAD POST OPTIONS TRACE
| Potentially risky methods: TRACE
| See http://nmap.org/nsedoc/scripts/http-methods.html
| GET / -> HTTP/1.1 200 OK
| HEAD / -> HTTP/1.1 200 OK
| POST / -> HTTP/1.1 200 OK
| OPTIONS / -> HTTP/1.1 200 OK
|_TRACE / -> HTTP/1.1 200 OK

Requires


Author: Bernd Stroessenreuther <berny1@users.sourceforge.net>

License: VER007 整理 http://www.ver007.com