NineSec Team Shell
Server IP : 184.107.3.203  /  Your IP : 216.73.216.51
Web Server : Apache
System : Linux dedicated2.avenfashion.com.ph 4.18.0-553.40.1.el8_10.x86_64 #1 SMP Mon Feb 10 12:11:18 EST 2025 x86_64
User : adminteladeoro ( 1015)
PHP Version : 8.2.28
Disable Function : exec,passthru,shell_exec,system
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON
Directory (0755) :  /usr/share/doc/nmap-ncat/examples/scripts/http-scan/

[  Home  ][  C0mmand  ][  Upload File  ]

Current File : //usr/share/doc/nmap-ncat/examples/scripts/http-scan/README
HTTP-SCAN with Ncat
~~~~~~~~~~~~~~~~~~~

This is a simple exercise that uses a small amount of
scripted automation that will throw out the banner
information of n number of hosts listed in the file "iplist".

Ncat uses the "get.request" HTTP header to get the newly
connected webserver to tell you about itself.

Usage: ./scan-example

Variables to change: None, but you may want to change "iplist"
                     to other more informative hosts.

NineSec Team - 2022