Penetration Testing mailing list archives

Re: Strange server test tool


From: Volker Tanger <vtlists () wyae de>
Date: Sun, 19 Feb 2006 14:25:43 +0100

Greetings!


On Sat, 18 Feb 2006 21:56:50 +0100
"Luchino - Samel" <samelinux () gmail com> wrote:
i'm new to the list and i need a tool to test some web server.
The tool i'm watching for have to send a raw http packet with a 
http request for a page from a specified IP

Just use plain old TELNET and type

        telnet www.the_host_to_test.kind 80
    ---connection starts---
        GET /dir/page.asp?var=value HTTP/1.0
        Host: www.the_host_to_test.kind

        
    ---connection ends---

Make sure you enter a double new-line after the Host: header line.
Depending of your backscroll buffer you might want to capture the
outpout into a file. On Unix you simply can use

        telnet www.the_host_to_test.kind 80 | tee OUTPUTFILE

If you want to do scripting I'd recommend using NETCAT instead of
TELNET. For additional examples and other protocols you could look into
the Checks/ directory of the MoSSHe monitoring system
(http://www.wyae.de/software/mosshe/).

Bye

Volker


-- 

Volker Tanger    http://www.wyae.de/volker.tanger/
--------------------------------------------------
vtlists () wyae de                    PGP Fingerprint
378A 7DA7 4F20 C2F3 5BCC  8340 7424 6122 BB83 B8CB

------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner: 

Hackers are concentrating their efforts on attacking applications on your 
website. Up to 75% of cyber attacks are launched on shopping carts, forms, 
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are 
futile against web application hacking. Check your website for vulnerabilities 
to SQL injection, Cross site scripting and other web attacks before hackers do! 
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------


Current thread: