- Server header fingerprinting – If the webserver returns a server header, davscan can search for public exploits based on the response.
- Basic DAV scanning with PROPFIND – Quick scan to find anything that might be visible from DAV.
- Unicode Auth Bypass – Works using GET haven’t added PROPFIND yet. Not fully tested so double check the work.
- Exclusion of DoS exploit results – You can exclude denial of service exploits from the searchsploit results.
- Exclusion of MSF modules from exploit results – Custom searchsploit is included in the repo for this. Either overwrite existing searchsploit or backup and replace. This feature may or may not end up in the real searchsploit script.
Help & Output
usage: davscan.py [-h] -H HOST [-p PORT] [-a AUTH] [-u USER] [-P PASSWORD] [-o OUTFILE] [-d ] [-m ] -H HOST, --host HOST hostname or IP address of web server; -h foo.com optional arguments: -h, --help show this help message and exit -p PORT, --port PORT port to connect to the host on (defaults to port 80); -p 80 -a AUTH, --auth AUTH Basic authentication required; -a basic -u USER, --user USER user; -u derp -P PASSWORD, --password PASSWORD password for user; -P 'hunter2' -o OUTFILE, --out OUTFILE output file. defaults to /tmp/davout; -o /foo/bar -d, --no-dos exclude DoS results from searchploit. -m, --no-msf exclude MSF modules from results.
Latest posts by Unallocated Author (see all)
- Major Trends in Cyber Security to Expect in 2020 - December 12, 2019
- 5 Robust Cybersecurity Practices for Your Email Marketing Campaigns - December 5, 2019
- 5 Insider Threat Solutions You Should Follow in 2019 - November 29, 2019