

You have attempted to execute a CGI, ISAPI, or other executable program from a directory that does not allow programs to be executed.Ĭontact the Web site administrator if you believe this directory should allow execute access. NOTE Random string for this session: l8Qkwc 我们之前在nmap中勘探到,这个webdav支持相当多的方法 Allowed Methods: OPTIONS, TRACE, GET, HEAD, DELETE, COPY, MOVE, PROPFIND, PROPPATCH, SEARCH, MKCOL, LOCK, UNLOCK Microsoft IIS 6.0/7.5 (+ PHP) - Multiple V | windows/remote/19033.txt Microsoft IIS 6.0 - WebDAV Remote Authenti | windows/remote/ Microsoft IIS 6.0 - WebDAV Remote Authenti | windows/remote/8765.php Microsoft IIS 6.0 - WebDAV Remote Authenti | windows/remote/8754.patch Microsoft IIS 6.0 - WebDAV Remote Authenti | windows/remote/8704.txt Microsoft IIS 6.0 - WebDAV 'ScStoragePathF | windows/remote/41738.py Microsoft IIS 6.0 - ASP Stack Overflow Sta | windows/dos/15167.txt Microsoft IIS 6.0 - '/AUX / '.aspx' Remote | windows/dos/ Microsoft IIS 5.0/6.0 FTP Server - Stack E | windows/dos/9587.txt Microsoft IIS 5.0/6.0 FTP Server (Windows | windows/remote/ Microsoft IIS 4.0/5.0/6.0 - Internal IP Ad | windows/remote/21057.txt

200 - 106B - /_vti_bin/shtml.exe/qwertyuiop 用dirsearch扫一下敏感目录 python3.9 dirsearch.py -u Įxtensions: php, aspx, jsp, html, js | HTTP method: GET | Threads: 30 | Wordlist size: 10977

Nmap done: 1 IP address (1 host up) scanned in 40.55 seconds
Davtest how to exploit txt and html executable windows#
Service Info: OS: Windows CPE: cpe:/o:microsoft:windows |_ Allowed Methods: OPTIONS, TRACE, GET, HEAD, DELETE, COPY, MOVE, PROPFIND, PROPPATCH, SEARCH, MKCOL, LOCK, UNLOCK | Public Options: OPTIONS, TRACE, GET, HEAD, DELETE, PUT, POST, COPY, MOVE, MKCOL, PROPFIND, PROPPATCH, LOCK, UNLOCK, SEARCH |_ Potentially risky methods: TRACE DELETE COPY MOVE PROPFIND PROPPATCH SEARCH MKCOL LOCK UNLOCK PUT Nmap done: 1 IP address (1 host up) scanned in 39.33 seconds
