- Nikto v2.1.6/2.1.5 + Target Host: 10.10.10.15 + Target Port: 80 + GET Retrieved microsoftofficewebserver header: 5.0_Pub + GET Retrieved x-powered-by header: ASP.NET + GET The anti-clickjacking X-Frame-Options header is not present. + GET The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS + GET Uncommon header 'microsoftofficewebserver' found, with contents: 5.0_Pub + GET The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type + OPTIONS Retrieved dasl header: + OPTIONS Retrieved dav header: 1, 2 + OPTIONS Retrieved ms-author-via header: MS-FP/4.0,DAV + OPTIONS Uncommon header 'ms-author-via' found, with contents: MS-FP/4.0,DAV + OPTIONS Allowed HTTP Methods: OPTIONS, TRACE, GET, HEAD, DELETE, COPY, MOVE, PROPFIND, PROPPATCH, SEARCH, MKCOL, LOCK, UNLOCK + OSVDB-5646: GET HTTP method ('Allow' Header): 'DELETE' may allow clients to remove files on the web server. + OSVDB-5647: GET HTTP method ('Allow' Header): 'MOVE' may allow clients to change file locations on the web server. + OPTIONS Public HTTP Methods: OPTIONS, TRACE, GET, HEAD, DELETE, PUT, POST, COPY, MOVE, MKCOL, PROPFIND, PROPPATCH, LOCK, UNLOCK, SEARCH + OSVDB-5646: GET HTTP method ('Public' Header): 'DELETE' may allow clients to remove files on the web server. + OSVDB-397: GET HTTP method ('Public' Header): 'PUT' method could allow clients to save files on the web server. + OSVDB-5647: GET HTTP method ('Public' Header): 'MOVE' may allow clients to change file locations on the web server. + OPTIONS WebDAV enabled (PROPPATCH COPY LOCK SEARCH MKCOL UNLOCK PROPFIND listed as allowed) + OSVDB-13431: PROPFIND PROPFIND HTTP verb may show the server's internal IP address: http://granny/_vti_bin/_vti_aut/author.dll + OSVDB-396: GET /_vti_bin/shtml.exe: Attackers may be able to crash FrontPage by requesting a DOS device, like shtml.exe/aux.htm -- a DoS was not attempted. + OSVDB-3233: GET /_vti_bin/: FrontPage directory found. + OSVDB-3300: GET /_vti_bin/: shtml.exe/shtml.dll is available remotely. Some versions of the Front Page ISAPI filter are vulnerable to a DOS (not attempted). + OSVDB-3500: GET /_vti_bin/fpcount.exe: Frontpage counter CGI has been found. FP Server version 97 allows remote users to execute arbitrary system commands, though a vulnerability in this version could not be confirmed. CVE-1999-1376. BID-2252. + OSVDB-67: POST /_vti_bin/shtml.dll/_vti_rpc: The anonymous FrontPage user is revealed through a crafted POST. + GET /_vti_bin/_vti_adm/admin.dll: FrontPage/SharePoint file found. + GET Retrieved x-aspnet-version header: 1.1.4322