Description: The preparation of vulnerability scanners detect a remote server that may exist with the security risks of the file exists, and its socket to establish the process and above the port scanner is the same, the difference is that vulnerability scanners typically use port 80, and then on the port send a GET request for the document, the server receives the request will return the contents of the documents, if the file does not exist then return an error message, through the receiver can determine whether to return to the contents of the file exists. Send and receive data need to use the function send () and recv (), exists in another string convection judge need to use the function strstr (), which apart from the need to have the socket library of knowledge, also need some string library知识.
To Search:
File list (Check if you may need any files):