Script http-userdir-enum

Script types: portrule
Categories: auth, intrusive
Download: https://svn.nmap.org/nmap/scripts/http-userdir-enum.nse

Script Summary

Attempts to enumerate valid usernames on web servers running with the mod_userdir module or similar enabled.

The Apache mod_userdir module allows user-specific directories to be accessed using the http://example.com/~user/ syntax. This script makes http requests in order to discover valid user-specific directories and infer valid usernames. By default, the script will use Nmap's nselib/data/usernames.lst. An HTTP response status of 200 or 403 means the username is likely a valid one and the username will be output in the script results along with the status code (in parentheses).

This script makes an attempt to avoid false positives by requesting a directory which is unlikely to exist. If the server responds with 200 or 403 then the script will not continue testing it.

CVE-2001-1013: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-1013.

Script Arguments

http-userdir-enum.limit

The maximum number of users to check.

http-userdir-enum.users

The filename of a username list.

slaxml.debug

See the documentation for the slaxml library.

http.host, http.max-body-size, http.max-cache-size, http.max-pipeline, http.pipeline, http.truncated-ok, http.useragent

See the documentation for the http library.

smbdomain, smbhash, smbnoguest, smbpassword, smbtype, smbusername

See the documentation for the smbauth library.

Example Usage

nmap -sV --script=http-userdir-enum <target>

Script Output

80/tcp open  http    syn-ack Apache httpd 2.2.9
|_ http-userdir-enum: Potential Users: root (403), user (200), test (200)

Requires


Author:

  • jah

License: Same as Nmap--See https://nmap.org/book/man-legal.html