Question: Nikto is a free Open Source ( GPL ) software command - line vulnerability scanner that scans webservers for dangerous files and CGIs, outdated server
Nikto is a free Open Source GPL software commandline vulnerability scanner that scans webservers for dangerous files and CGIs, outdated server software, and other problems. It performs generic and server type specific checks. It also checks for server configuration items such as the presence of multiple index files and HTTP server options, and will attempt to identify installed web servers and software. It also captures and prints any cookies received.
Sample Web Server Scan:
Nikto v
Target IP:
Target Hostname:
Target Port:
Start Time: ::
Server: ApacheUbuntu PHPubuntu with SuhosinPatch
Root page redirects to: loginphp
OSVDB: robots.txt contains entry, which should be manually viewed.
OSVDB: Apache appears to be outdated current is at least Apache
Apache and are also current.
OSVDB: Number of sections in the version string differ from those in the database, the server reports: while the database has: This may cause false positives.
OSVDB: PHPubuntu appears to be outdated current is at least
OSVDB: HTTP TRACE method is active, suggesting the host is vulnerable to X
ST
OSVDB: ETag header found on server, inode: size: mtime: xdfae
b
OSVDB: config: Configuration information may be available remotely.
OSVDB: phpini: This file should not be available through the web interface
OSVDB: indexphpPHPBBFACdAACBC: PHP reveals potentially sensitive information via certain HTTP requests, which contain specific QUERY strings.
OSVDB: config: Directory indexing is enabled: config
OSVDB: login: This might be interesting...
OSVDB: setup: This might be interesting...
OSVDB: icons: Directory indexing is enabled: icons
OSVDB: docs: Directory indexing is enabled: docs
OSVDB: README: README file found.
OSVDB: CHANGELOGtxt: A changelog was found.
OSVDB: iconsREADME: Apache default file found.
items checked: items reported on remote host
End Time: :: seconds
hosts tested
What vulnerabilities were found?
What was at least one specific exploit that was listed OSVDBXXX
What risks do the vulnerabilities create?
How could they be remediated?
What practices should be used to prevent similar vulnerabilities?
What protective measures could be used if applications or servers could not be fixed?
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
