NIKTO2
NOTE:
Perl must be installed on the system to run the Nikto
## To download Nikto2 use below link
http://www.cirt.net/Nikto2
tar -xzvf nikto-2.1.5.tar.gz
cd nikto-2.1.5
perl nikto.pl -h 172.16.10.10
perl nikto.pl -h 172.16.10.10:8080
Features:
Here are some of the major features of Nikto.
Nikto is an Open Source (GPL)
web server scanner which performs comprehensive tests against web
servers for multiple items, including over 6700 potentially dangerous
files/CGIs, checks for outdated versions of over 1250 servers, and
version specific problems on over 270 servers. It also checks for server
configuration items such as the presence of multiple index files, HTTP
server options, and will attempt to identify installed web servers and
software. Scan items and plugins are frequently updated and can be
automatically updated.
Nikto is not designed as an overly stealthy tool. It will test a web
server in the quickest time possible, and is fairly obvious in log
files. However, there is support for LibWhisker's anti-IDS methods in
case you want to give it a try (or test your IDS system).
NOTE:
Perl must be installed on the system to run the Nikto
## To download Nikto2 use below link
http://www.cirt.net/Nikto2
tar -xzvf nikto-2.1.5.tar.gz
cd nikto-2.1.5
perl nikto.pl -h 172.16.10.10
perl nikto.pl -h 172.16.10.10:8080
Features:
Here are some of the major features of Nikto.
- SSL Support (Unix with OpenSSL or maybe Windows with ActiveState's
Perl/NetSSL) - Full HTTP proxy support
- Checks for outdated server components
- Save reports in plain text, XML, HTML, NBE or CSV
- Template engine to easily customize reports
- Scan multiple ports on a server, or multiple servers via input file (including nmap output)
- LibWhisker's IDS encoding techniques
- Easily updated via command line
- Identifies installed software via headers, favicons and files
- Host authentication with Basic and NTLM
- Subdomain guessing
- Apache and cgiwrap username enumeration
- Mutation techniques to "fish" for content on web servers
- Scan tuning to include or exclude entire classes of vulnerability
checks - Guess credentials for authorization realms (including many default id/pw combos)
- Authorization guessing handles any directory, not just the root
directory - Enhanced false positive reduction via multiple methods: headers,
page content, and content hashing - Reports "unusual" headers seen
- Interactive status, pause and changes to verbosity settings
- Save full request/response for positive tests
- Replay saved positive requests
- Maximum execution time per target
- Auto-pause at a specified time
- Checks for common "parking" sites
- Logging to Metasploit
No comments:
Post a Comment