Added the verification instruction
parent
7119d3d7e8
commit
f731acc5e7
|
@ -2,6 +2,29 @@
|
||||||
|
|
||||||
This module will connect to a provided range of web severs and determine if directory listings are enabled on them.
|
This module will connect to a provided range of web severs and determine if directory listings are enabled on them.
|
||||||
|
|
||||||
|
## Vulnerable Application
|
||||||
|
|
||||||
|
This module has been verified against the web server listed below.
|
||||||
|
|
||||||
|
### Mock Vulnerable Server
|
||||||
|
|
||||||
|
These instructions will create a web sever using `apache` with directory listing vulnerability enabled on it.
|
||||||
|
|
||||||
|
#### Setup
|
||||||
|
|
||||||
|
1. Make a `.htaccess` file in `/var/www/html/` by simply `touch .htaccess`.
|
||||||
|
2. Create the vulnerable server by writing the following text to `/var/www/html/.htaccess`
|
||||||
|
|
||||||
|
```
|
||||||
|
Options +Indexes
|
||||||
|
```
|
||||||
|
|
||||||
|
3. Start the apache server `service apache2 start`.
|
||||||
|
|
||||||
|
#### Note
|
||||||
|
Make sure you dont have a `index.html` file in your `/var/www/html` for the vulnerability to work.
|
||||||
|
|
||||||
|
|
||||||
## Verification Steps
|
## Verification Steps
|
||||||
|
|
||||||
1. Do: ```use auxiliary/scanner/http/dir_listing```
|
1. Do: ```use auxiliary/scanner/http/dir_listing```
|
||||||
|
@ -11,25 +34,26 @@ This module will connect to a provided range of web severs and determine if dire
|
||||||
|
|
||||||
## Scenarios
|
## Scenarios
|
||||||
|
|
||||||
|
### Against the Mock server listed above
|
||||||
|
|
||||||
```
|
```
|
||||||
msf > use auxiliary/scanner/http/dir_listing
|
msf > use auxiliary/scanner/http/dir_listing
|
||||||
msf auxiliary(dir_listing) > set RHOSTS 192.168.1.200-254
|
msf auxiliary(scanner/http/dir_listing) > set RHOSTS 192.168.1.10-14
|
||||||
RHOSTS => 192.168.1.200-254
|
RHOSTS => 192.168.1.10-14
|
||||||
msf auxiliary(dir_listing) > set THREADS 55
|
msf auxiliary(scanner/http/dir_listing) > set THREADS 4
|
||||||
THREADS => 55
|
THREADS => 4
|
||||||
msf auxiliary(dir_listing) > run
|
msf auxiliary(scanner/http/dir_listing) > set verbose true
|
||||||
|
verbose => true
|
||||||
|
msf auxiliary(scanner/http/dir_listing) > run
|
||||||
|
|
||||||
[*] NOT Vulnerable to directory listing http://192.168.1.209:80/
|
[-] The connection was refused by the remote host (192.168.1.13:80).
|
||||||
[*] NOT Vulnerable to directory listing http://192.168.1.211:80/
|
[*] NOT Vulnerable to directory listing http://192.168.1.13:80/
|
||||||
[*] Found Directory Listing http://192.168.1.223:80/
|
[-] The connection was refused by the remote host (192.168.1.12:80).
|
||||||
[*] NOT Vulnerable to directory listing http://192.168.1.234:80/
|
[*] NOT Vulnerable to directory listing http://192.168.1.12:80/
|
||||||
[*] NOT Vulnerable to directory listing http://192.168.1.230:80/
|
[*] NOT Vulnerable to directory listing http://192.168.1.11:80/
|
||||||
[*] Scanned 27 of 55 hosts (049% complete)
|
[*] Scanned 3 of 4 hosts (75% complete)
|
||||||
[*] Scanned 50 of 55 hosts (090% complete)
|
[+] Found Directory Listing http://192.168.1.14:80/
|
||||||
[*] Scanned 52 of 55 hosts (094% complete)
|
[*] Scanned 4 of 4 hosts (100% complete)
|
||||||
[*] Scanned 53 of 55 hosts (096% compelte)
|
|
||||||
[*] Scanned 54 of 55 hosts (098% complete)
|
|
||||||
[*] Scanned 55 of 55 hosts (100% complete)
|
|
||||||
[*] Auxiliary module execution completed
|
[*] Auxiliary module execution completed
|
||||||
msf auxiliary(dir_listing) >
|
msf auxiliary(scanner/http/dir_listing) >
|
||||||
```
|
```
|
||||||
|
|
Loading…
Reference in New Issue