darkking Posted September 18, 2006 Report Posted September 18, 2006 ASP auditor v2 BETAAuthor david.kierznowski_at_gmail.comhttp://michaeldaw.orgpurpose: Look for common misconfigurations and information leaks inASP.NET applications.This tool is based on H D Moore’s Dot Net Application ScannerAuthor: H D Moore URL: http://www.digitaloffense.net/index.html?section=TOOLSHDM thanks for the feedback.Changelog:* Combined code from Asp Auditor v1 BETA and HDM’s DNAScanner.* Version plugin allowing specific ASP.NET versioning.* Version brute force capabilities using JavaScript validatedirectories.* Check if global ASP.NET validate is being used.* Added brute force as option in usage()-usage$ ./asp-audit-latest.plUsage: ./asp-audit-latest.pl [[url]http://target/app/file.aspx][/url] (opts)(opts)-bf brute force ASP.NET version using JS Validatedirectories.–example 1$ ./asp-audit.pl [url]http://www.*hidden*/index.aspx[/url][*] Sending initial probe request…[*] Sending path discovery request…[*] Sending ASP.NET validate discovery request…[*] Sending application trace request…[*] Sending null remoter service request…[ .NET Configuration Analysis ]Server -> Microsoft-IIS/6.0Application -> /FilePath -> D:VirtualServers*hidden*ADNVersion -> 1.1.4322.2300matches -> 1.1.4322.2300 Version 1.1 Post-SP1 (Windows Server 2003 SP1) Mar 2005–example 2$ ./asp-audit.pl [url]http://www.*hidden*/index.aspx[/url] -bf[*] Sending initial probe request…[*] Sending path discovery request…[*] Sending ASP.NET validate discovery request…[*] Sending application trace request…[*] Sending null remoter service request…[ .NET Configuration Analysis ]Server -> Microsoft-IIS/6.0AppTrace -> LocalOnlyApplication -> /FilePath -> D:inetpub*hidden*ADNVersion -> 1.1.4322.2300matches -> 1.1.4322.2300 Version 1.1 Post-SP1 (Windows Server 2003 SP1) Mar 2005[*] Sending brute force discovery requests…Found -> /aspnet_client/system_web/1_1_4322[url]http://michaeldaw.org/projects/asp-audit-latest.tar.gz[/url] Quote