Skip to content

Instantly share code, notes, and snippets.

Show Gist options
  • Save ByteReaper/a91035146ef4ad40b880872820a9dc35 to your computer and use it in GitHub Desktop.
Save ByteReaper/a91035146ef4ad40b880872820a9dc35 to your computer and use it in GitHub Desktop.
Sidney_Nikto
root@kali:~# nikto -host 192.168.234.167
- Nikto v2.1.6
---------------------------------------------------------------------------
+ Target IP: 192.168.234.167
+ Target Hostname: 192.168.234.167
+ Target Port: 80
+ Start Time: 2016-06-06 14:22:04 (GMT-4)
---------------------------------------------------------------------------
+ Server: Apache/2.4.18 (Ubuntu)
+ Server leaks inodes via ETags, header found with file /, fields: 0x116 0x5339ba83ee199
+ The anti-clickjacking X-Frame-Options header is not present.
+ The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
+ The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
+ No CGI Directories found (use '-C all' to force check all possible dirs)
+ Uncommon header 'tcn' found, with contents: list
+ Apache mod_negotiation is enabled with MultiViews, which allows attackers to easily brute force file names. See http://www.wisec.it/sectou.php?id=4698ebdc59d15. The following alternatives for 'index' were found: index.html
+ Allowed HTTP Methods: OPTIONS, GET, HEAD, POST
+ OSVDB-3233: /icons/README: Apache default file found.
+ 7535 requests: 0 error(s) and 8 item(s) reported on remote host
+ End Time: 2016-06-06 14:22:13 (GMT-4) (9 seconds)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment