DAVScan is a quick and lightweight WebDAV security scanner designed to discover hidden files and folders on DAV enabled web servers. The scanner works by taking advantage of overly privileged/misconfigured WebDAV servers or servers vulnerable to various disclosure or authentication bypass vulnerabilities.
The scanner attempts to fingerprint the target server and then spider the server based on the results of a root PROPFIND request.Features Server header fingerprinting If the webserver returns a server header, davscan can search for public exploits based on the response. Basic DAV scanning with PROPFIND Quick scan to find anything that might be visible from DAV. Unicode Auth Bypass Works using GET haven’t added PROPFIND yet. Not fully tested so double check the work. Exclusion of DoS exploit results You can exclude denial of service exploits from the searchsploit results. Exclusion of MSF modules from exploit results Custom searchsploit is included in the repo for this. Either overwrite existing searchsploit or backup and replace. This feature may or may not end up in the real searchsploit script. Usage davscan.py [-h] -H HOST [-p PORT] [-a AUTH] [-u USER] [-P PASSWORD] [-o OUTFILE] [-d ] [-m ] -H HOST, --hostHOSThostnameor IPaddressofwebserver; -h foo.com optionalarguments: -h, --helpshowthis helpmessageand exit -p PORT, --portPORTportto connectto thehoston (defaultsto port 80); -p 80 -a AUTH, --authAUTHBasicauthenticationrequired; -a basic -u USER, --userUSERuser; -u derp -P PASSWORD, --passwordPASSWORDpasswordfor user; -P 'hunter2' -o OUTFILE, --outOUTFILEoutputfile. defaultsto /tmp/davout; -o /foo/bar -d, --no-dosexcludeDoSresultsfromsearchploit. -m, --no-msfexcludeMSFmodulesfromresults.
You can download DAVScan here:
Or read more here .