Nmap Development mailing list archives

Re: New script for nmap that test XST vulnerability


From: Wagiro <Edu () wagiro es>
Date: Fri, 09 Jul 2010 16:24:58 +0200


Hi Wagiro,

Thanks for picking this up, I'd completely forgotten that my modified
http-trace script that specifically checks for XST had stalled in its
development.

http://seclists.org/nmap-dev/2007/q4/617

A script to check this issue would still certainly be useful for me. I'm
concerned that your new script doesn't sufficiently check the output to
confirm XST, as any server that modifies the trace request (which would
probably get flagged by Kri's original script) could potentially generate a
false positive (although I admit it's probably unlikely). Is it possible
you could modify the script to send a fairly unique (perhaps use random
numbers in the alert?) attack and then check the returned body for the
malicious string we'd submitted to the server?

Cheers,

Rob

  
Hi Rob,

Thanks for your response. I wanted to ask you some questions:

In which cases would be useful to use the random token and which
improvements incorporates on the standard alert('XSS')?

Cheers,

Eduardo.

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: