Web

nmap -sV --script http-enum 10.2.23.197 -p80

nmap -sV --script http-headers -p80 10.2.23.197

nmap --script http-methods --script-args http-methods.url-path='/webdav/' IP

nmap --script http-webdav-scan --script-args http-methods.url-path='/webdav/' IP

accessible folders

Nmap --script http-enum -p80,443 IP

change root dir

Nmap --script http-enum -script-args http-enum.basepath=/mantis2.3.0/ -p80

enum users

Nmap -80 --script http-userdir-enum IP

account and password guessing

Nmap -80 --script http-brute IP

Nmap -80 --script http-brute --script-args userdb=/var/username.txt,passdb=/var/passwords.txt

IP check out other options Nmap -80 --script http-wordpress-brute IP

Nmap -80 --script http-joomla-brute IP

id's IDS and Fw's

Nmap -80 --script http-waf-detect,http-waf-fingerprint IP

XSS vulns - lots more options for this

Nmap -80 --script http-unsafe-output-escaping IP

check online db for xss vulns

Nmap -80 --script http-xssed IP

check for default creds Nmap -80 --script http--default-accounts IP

Last updated