Question: Nikto is a free Open Source ( GPL ) software command - line vulnerability scanner that scans webservers for dangerous files and CGIs, outdated server

Nikto is a free Open Source (GPL) software command-line vulnerability scanner that scans webservers for dangerous files and CGIs, outdated server software, and other problems. It performs generic and server type specific checks. It also checks for server configuration items such as the presence of multiple index files and HTTP server options, and will attempt to identify installed web servers and software. It also captures and prints any cookies received.
Sample Web Server Scan:
- Nikto v2.1.0
---------------------------------------------------------------------------
+ Target IP: 192.168.2.111
+ Target Hostname: 192.168.2.111
+ Target Port: 80
+ Start Time: 2010-07-0822:52:11
---------------------------------------------------------------------------
+ Server: Apache/2.2.8(Ubuntu) PHP/5.2.4-2ubuntu5.10 with Suhosin-Patch
- Root page / redirects to: login.php
+ OSVDB-0: robots.txt contains 1 entry, which should be manually viewed.
+ OSVDB-0: Apache/2.2.8 appears to be outdated (current is at least Apache/2.2.1
4). Apache 1.3.41 and 2.0.63 are also current.
+ OSVDB-0: Number of sections in the version string differ from those in the database, the server reports: 5.2.4.45.2.117.98.117.110.116.117.5.10 while the database has: 5.2.8. This may cause false positives.
+ OSVDB-0: PHP/5.2.4-2ubuntu5.10 appears to be outdated (current is at least 5.2.8)
+ OSVDB-877: HTTP TRACE method is active, suggesting the host is vulnerable to X
ST
+ OSVDB-0: ETag header found on server, inode: 1681, size: 26, mtime: 0x46dfa70e
2b580
+ OSVDB-0: /config/: Configuration information may be available remotely.
+ OSVDB-0: /php.ini: This file should not be available through the web interface
+ OSVDB-12184: /index.php?=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000: PHP reveals potentially sensitive information via certain HTTP requests, which contain specific QUERY strings.
+ OSVDB-3268: /config/: Directory indexing is enabled: /config/
+ OSVDB-3092: /login/: This might be interesting...
+ OSVDB-3092: /setup/: This might be interesting...
+ OSVDB-3268: /icons/: Directory indexing is enabled: /icons
+ OSVDB-3268: /docs/: Directory indexing is enabled: /docs
+ OSVDB-3092: /README: README file found.
+ OSVDB-3092: /CHANGELOG.txt: A changelog was found.
+ OSVDB-3233: /icons/README: Apache default file found.
+3588 items checked: 17 item(s) reported on remote host
+ End Time: 2010-07-0822:53:52(101 seconds)
---------------------------------------------------------------------------
+1 host(s) tested
What vulnerabilities were found?
What was at least one specific exploit that was listed (OSVDB-XXX)?
What risks do the vulnerabilities create?
How could they be remediated?
What practices should be used to prevent similar vulnerabilities?
What protective measures could be used if applications or servers could not be fixed?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!