Nmap Development mailing list archives

Re: NSE Script http-methods.nse


From: Bernd Stroessenreuther <berny1 () users sourceforge net>
Date: Fri, 5 Mar 2010 20:27:03 +0100

Hi David,

I made changes and this is how it works now:

$ nmap -p 80 -sC www.google.com www.apache.org www.bamsoftware.com
Nmap scan report for www.google.com (74.125.19.99)
PORT   STATE SERVICE
80/tcp open  http

|_http-methods: No Allow or Public header in OPTIONS response (status code
| 400)

Nmap scan report for www.apache.org (192.87.106.226)
PORT   STATE SERVICE
80/tcp open  http

| http-methods: Potentially risky methods: TRACE
|_See http://nmap.org/nsedoc/scripts/http-methods.html

Nmap scan report for www.bamsoftware.com (69.164.193.231)
PORT   STATE SERVICE
80/tcp open  http


$ nmap -p 80 -sC -v www.google.com www.apache.org www.bamsoftware.com
Nmap scan report for www.google.com (74.125.19.105)
PORT   STATE SERVICE
80/tcp open  http

|_http-methods: No Allow or Public header in OPTIONS response (status code
| 400)

Nmap scan report for www.apache.org (192.87.106.226)
PORT   STATE SERVICE
80/tcp open  http

| http-methods: GET HEAD POST OPTIONS TRACE
| Potentially risky methods: TRACE
|_See http://nmap.org/nsedoc/scripts/http-methods.html

Nmap scan report for www.bamsoftware.com (69.164.193.231)
PORT   STATE SERVICE
80/tcp open  http

|_http-methods: GET HEAD POST OPTIONS

Does that look good?

Looks great from my point of view!

Bernd
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: