Exploit HTTP PUT method To Hack A Server
In Summary : First of all, we need to determine which HTTP methods are allowed and find if there is any HTTP PUT method available. By usin...
https://updatesinfosec.blogspot.com/2018/05/exploit-http-put-method-to-hack-server.html
In Summary :
First of all, we need to determine which HTTP methods are allowed and find if there is any HTTP PUT method available. By using nmap tool we can determine the allowed HTTP PUT method. We will use the Metasploitable server as our victim machine. Nmap port scan showed that Metasploitable is running Microsoft IIS on port [...]
kindly refer the following link as follow up :
https://ift.tt/2kdjBNW
First of all, we need to determine which HTTP methods are allowed and find if there is any HTTP PUT method available. By using nmap tool we can determine the allowed HTTP PUT method. We will use the Metasploitable server as our victim machine. Nmap port scan showed that Metasploitable is running Microsoft IIS on port [...]
kindly refer the following link as follow up :
https://ift.tt/2kdjBNW
