Nmap Development mailing list archives
TODO task implemented in http-vuln-cve2014-3704.nse
From: Rewanth Cool <ravatheruler4 () gmail com>
Date: Sun, 26 Mar 2017 22:11:27 +0530
The developer marked a todo task in the script http-vuln-cve2014-3704.nse. The todo task was to parse the body of the response to find the status of the executed payload. If the payload is successful in exploiting then return the username, password used as payload, if not return nothing. The same is implemented in PR #799 <https://github.com/nmap/nmap/pull/799> . Best regards, Rewanth.
_______________________________________________ Sent through the dev mailing list https://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/
Current thread:
- TODO task implemented in http-vuln-cve2014-3704.nse Rewanth Cool (Mar 26)