Metasploit mailing list archives
Problem with Apache Win32 Chunked Encoding
From: rhyskidd at gmail.com (Rhys Kidd)
Date: Tue, 30 Oct 2007 20:12:35 +0900
Well the Check functionality should through the line below, indicate the value of the "Server" HTTP Header. print_status("Serer is probably not vulnerable: #{response['Server']}") <- By the way a typo there HD. Seeing as your target server appears to not include the Server HTTP Header, how are you picking the TARGET you are using? Is the server even vulnerable? Can you find out the Apache build through another means? Folder listing perhaps. Rhys Kidd -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20071030/e58b1bb6/attachment.htm>
Current thread:
- Problem with Apache Win32 Chunked Encoding bluefoxy (Oct 30)
- Problem with Apache Win32 Chunked Encoding Rhys Kidd (Oct 30)
- Problem with Apache Win32 Chunked Encoding bluefoxy (Oct 30)
- Problem with Apache Win32 Chunked Encoding Rhys Kidd (Oct 30)
- Problem with Apache Win32 Chunked Encoding bluefoxy (Oct 30)
- mcafee Entercept Weston, David G. (Oct 30)
- mcafee Entercept H D Moore (Oct 30)
- Problem with Apache Win32 Chunked Encoding Patrick Webster (Oct 30)
- Problem with Apache Win32 Chunked Encoding Mr Gabriel (Oct 31)
- Problem with Apache Win32 Chunked Encoding bluefoxy (Nov 01)
- Problem with Apache Win32 Chunked Encoding Kurt Grutzmacher (Nov 01)
- Problem with Apache Win32 Chunked Encoding Patrick Webster (Nov 01)
- Problem with Apache Win32 Chunked Encoding bluefoxy (Oct 30)
- Problem with Apache Win32 Chunked Encoding Rhys Kidd (Oct 30)