![]() ![]() allseeingeye-infoĭetects the All-Seeing Eye service. Requests a URI over the Apache JServ Protocol and displays the result Protocol) server by sending an OPTIONS request and lists potentially ![]() ajp-methodsĭiscovers which options are supported by the AJP (Apache JServ Optional directory of an Apache JServ Protocol server and returns the server response headers. Performs a HEAD or GET request against either the root directory or any The Apache JServ Protocol is commonly used by web servers to communicate withīack-end Java application server containers. Performs brute force passwords auditing against the Apache JServ protocol. Retrieves the authentication scheme and realm of an AJP service (Apache JServ Protocol) that requires authentication. Hostname, IPv4 and IPv6 addresses, and hardware type (for example afp-path-vulnĭetects the Mac OS X AFP directory traversal vulnerability, CVE-2010-0533. The output is intended to resemble the output of ls. afp-lsĪttempts to get useful information about files from AFP volumes. Performs password guessing against Apple Filing Protocol (AFP). Shows extra information about IPv6 addresses, such as embedded MAC or IPv4 addresses when available. The information retrieved by this script includes theĭaemon version, API version, administrator e-mail address and ![]() Acarsd decodesĪCARS (Aircraft Communication Addressing and Reporting System) data in Retrieves information from a listening acarsd daemon. Click on a script name for more detailed information. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |