CalvinMiyatake

New Member
Joined
Oct 17, 2019
Messages
2
I have a NON-IIS Windows Server that our Security Scan is detecting Options Method Enabled on it. How can I resolve this vulnerability if IIS is not installed?
 


Solution
If you don't mind dumping some data then probably. You may PM it to me if you don't want it publicly displayed.

Open a Powershell prompt and run the following and upload or PM the text files created on your desktop

Get-NetTCPConnection | Out-File "$($env:USERPROFILE)\Desktop\NetworkConnections.txt"
Get-Package | Select * | Out-File "$($env:USERPROFILE)\Desktop\InstalledSoftware.txt"
Get-Process | Select Name,Path,ID | Out-File "$($env:USERPROFILE)\Desktop\ProcessList.txt"
Depends on what is running on the server and what is presenting the HTTP options.
 


If you don't mind dumping some data then probably. You may PM it to me if you don't want it publicly displayed.

Open a Powershell prompt and run the following and upload or PM the text files created on your desktop

Get-NetTCPConnection | Out-File "$($env:USERPROFILE)\Desktop\NetworkConnections.txt"
Get-Package | Select * | Out-File "$($env:USERPROFILE)\Desktop\InstalledSoftware.txt"
Get-Process | Select Name,Path,ID | Out-File "$($env:USERPROFILE)\Desktop\ProcessList.txt"
 


Solution
Back
Top