Metasploit mailing list archives

Re: dir_scanner module


From: Hendrik Baecker <andurin () process-zero de>
Date: Wed, 06 Oct 2010 22:20:35 +0200



On 06.10.10 17:41, schrieb Jonathan Cran:

Hendrik -- Definitely. It'd be nice to see internal ip addresses leaked
through the headers, in addition to any other interesting info that was
leaked. here's a newer KB article for one of the issues you're
describing http://support.microsoft.com/kb/218180


Hi Josh,

Thanks for the interest. I'm just dealing with the art of metasploit
coding in ruby.

.5 $ for a tipp how to send HTTP/1.0 requests with
Msf::Exploit::Remote::HttpClient ?

-
Hendrik
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


Current thread: