DAVTest – WebDAV Vulnerability Scanning (Scanner) Tool

Your website & network are Hackable


When facing off against a WebDAV enabled server, there are two things to find out quickly: can you upload files, and if so, can you execute code?

DAVTest attempts help answer those questions, as well as enable the pentester to quickly gain access to the host. DAVTest tries to upload test files of various extension types (e.g., “.php” or “.txt”), checks if those files were uploaded successfully, and then if they can execute on the server. It also allows for uploading of the files as plain text files and then trying to use the MOVE command to rename them to an executable.

Assuming you can upload an executable, a test file does you no good–so DAVTest can automatically upload a fully functional shell. It ships with shells for PHP, ASP, ASPX, CFM, JSP, CGI, and PL, and dropping a file in the right directory will let you upload any back-door you like.

Features


  • Upload with executable extension or .txt
  • Checks for successful upload and execution
  • Supports MOVE and MKCOL
  • Can upload backdoor/shell or arbitrary files
  • Basic authentication

DAVTest is written in PERL and licensed under the GPLv3.

You can download DAVTest v1.0 here:

davtest-1.0.zip

Or read more here.


Posted in: Exploits/Vulnerabilities, Hacking Tools, Web Hacking

, , , , , , , , , , ,

Recent in Exploits/Vulnerabilities:
- Shadow Brokers NSA Hack Leaks 0-day Vulnerabilities
- Pompem – Exploit & Vulnerability Finder
- Bug Bounties Reaching $500,000 For iOS Exploits

Related Posts:

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 235,451 views
- AJAX: Is your application secure enough? - 120,208 views
- eEye Launches 0-Day Exploit Tracker - 85,651 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


2 Responses to DAVTest – WebDAV Vulnerability Scanning (Scanner) Tool

  1. pinkjabe May 1, 2010 at 8:34 pm #

    Vulberability—-> Vulnerability

    • Darknet May 2, 2010 at 5:50 am #

      Thanks – fixed.