scanning
scanning copied to clipboard
Hello; I would like to thank you first guys for sharing. you are doing an amazing job. I am getting the below errors during the script execution: ``python3 proxyshell.py -t...
First of all: Thanks for the script. I tried it against multiple servers, always getting this error: ``` nmap -sT -p 443 -P0 --script http-vuln-exchange-proxyshell.nse host.domain.de Starting Nmap 7.92 (...
There are more patchable version of Exchange now. I have adapted the script to recognize them.
Hi, thank you for the fine .nse, we're getting tons of results already. As we are scanning based on ip addresses, an issue comes up everytime a web server redirects...
Fix concatenation of incompatible types by expanding array elements This fixes issue #3
All servers have the latest CU and the security patch installed. What does this message mean? |_http-server-header: Microsoft-IIS/10.0 |_http-vuln-exchange: (15.2.792) Exchange 2019 potentially vulnerable, check latest security update is applied...
The word "potentially" implies a certain likelihood - even more so for non-native english speakers, which is not a determination that the script can make just be looking at the...
Line 64 -> 71 Server version is at most 15.0.1497, does this mean that 2013s are still at risk even after the patch? Compare Microsoft: https://docs.microsoft.com/de-de/exchange/new-features/build-numbers-and-release-dates?view=exchserver-2019#exchange-server-2013 Cheers
The script gives different results depending on if it's used for scanning multiple nets or single IPs. There are hosts which sometimes give this result when scanning multiple nets: ```...
When running the script, i encountered the erro : http.request socket error: The script encountered an error: - tcp failed: - Failed to connect: - Could not connect: - TIMEOUT