Inspathx/Example1

From aldeid
Jump to navigation Jump to search
You are here:
Example #1: phpmyadmin-3.3.9

Description

This section shows the results of Inspathx run against phpmyadmin v3.3.9.

Inspathx output

$ ruby inspathx.rb \
-d /usr/local/www/admin/phpmyadmin/ \
-u http://localhost/admin/phpmyadmin/

=============================================================
Path Discloser (a.k.a inspathx) / Error Hunter
 (c) Aung Khant, aungkhant[at]yehg.net
  YGN Ethical Hacker Group, Myanmar, http://yehg.net/

svn co http://inspathx.googlecode.com/svn/trunk/ inspathx
=============================================================

# target: http://localhost/admin/phpmyadmin//
# source: /usr/local/www/admin/phpmyadmin/
# log file: localhost_admin_phpmyadmin__.log
# follow redirect: false
# null cookie: false
# total threads: 10
# time: 16:50:36 01-28-2011

# waiting for child threads to finish ..

# vulnerable url(s) = 0
# total requests = 470
# done at 16:50:46 01-28-2011

Send bugs, suggestions, contributions to inspathx[at]yehg.net

Log file

INCOMPLETE SECTION OR ARTICLE
This section/article is being written and is therefore not complete.
Thank you for your comprehension.