http-rfi-spider
脚本使用类型:
portrule
脚本所属分类:
intrusive
脚本下载地址: http://nmap.org/svn/scripts/http-rfi-spider.nse
Crawls webservers in search of RFI (remote file inclusion) vulnerabilities. It tests every form field it finds and every parameter of a URL containing a query.
only spider URLs within the same host. (default: true)
the url to start spidering. This is a URL relative to the scanned host eg. /default.html (default: /)
only spider URLs within the same
domain. This widens the scope from withinhost
and can
not be used in combination. (default: false)
the url we will try to include, defaults
to http://www.yahoo.com/search?p=rfi
the maximum amount of directories beneath the initial url to spider. A negative value disables the limit. (default: 3)
the maximum amount of pages to visit. A negative value disables the limit (default: 20)
the pattern to search for in response.body
to determine if the inclusion was successful, defaults to
'<a href="http://search.yahoo.com/info/submit.html">Submit Your Site</a>'
执行格式
nmap --script http-rfi-spider -p80 <host>
PORT STATE SERVICE REASON 80/tcp open http syn-ack | http-rfi-spider: | Possible RFI in form at path: /pio/rfi_test2.php, action: /rfi_test2.php for fields: | color |_ inc
Author: Piotr Olma
License: VER007 整理 http://www.ver007.com