Metasploit mailing list archives
Re: dir_scanner module
From: Hendrik Baecker <andurin () process-zero de>
Date: Wed, 06 Oct 2010 22:20:35 +0200
On 06.10.10 17:41, schrieb Jonathan Cran:
Hendrik -- Definitely. It'd be nice to see internal ip addresses leaked through the headers, in addition to any other interesting info that was leaked. here's a newer KB article for one of the issues you're describing http://support.microsoft.com/kb/218180
Hi Josh, Thanks for the interest. I'm just dealing with the art of metasploit coding in ruby. .5 $ for a tipp how to send HTTP/1.0 requests with Msf::Exploit::Remote::HttpClient ? - Hendrik _______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- dir_scanner module alfonso caponi (Oct 05)
- Re: dir_scanner module Hendrik Bäcker (Oct 05)
- Re: dir_scanner module Jonathan Cran (Oct 06)
- Re: dir_scanner module Hendrik Baecker (Oct 06)
- Re: dir_scanner module Jonathan Cran (Oct 06)
- Re: dir_scanner module Hendrik Bäcker (Oct 05)