Nikto – an open source scanner for web server security vulnerabilities

Configurare noua (How To)

Situatie

Nikto is a free and open-source tool designed to scan web servers for potential security vulnerabilities. It can identify over 6,700 vulnerabilities, including outdated software versions, security misconfigurations, and other common issues in web applications.

Key Features:

  • Detects over 6,700 vulnerabilities

  • Identifies misconfigurations and security holes in web servers

  • Supports SSL, HTTP, and HTTPS protocols

  • Offers options for brute-forcing directories and files

  • Provides customizable scanning options

Solutie

Installation of Nikto

For Linux

1.Install via Package Manager:

  • On Debian/Ubuntu:

sudo apt-get update
sudo apt-get install nikto

  • On Kali Linux, Nikto comes pre-installed, so you don’t need to install it separately.

2.Clone from GitHub (for the latest version):

git clone https://github.com/sullo/nikto.git
cd nikto

For macOS

1.Install using Homebrew:

brew install nikto

For Windows

  • Download the latest version from the official Nikto website or GitHub.

  • Extract the files and run Nikto from the command prompt.

Running Nikto

Once installed, Nikto can be run directly from the command line.

a) Basic Usage

To scan a web server, use the following command:

nikto -h http://<target-ip-or-domain>

  • Replace <target-ip-or-domain> with the IP address or domain name of the target website.

nikto -h http://example.com

Nikto will begin scanning the target and output the results to the terminal, including detected vulnerabilities, issues, and possible threats.

Commonly Used Nikto Options

a) Scan HTTPS Websites

To scan HTTPS websites, simply specify the https protocol:

nikto -h https://example.com

b) Scan with Proxy

You can configure Nikto to use a proxy server (e.g., for anonymity or traffic analysis):

nikto -h http://example.com -proxy http://127.0.0.1:8080

c) Scan Specific Port

If the target website is running on a non-standard port (e.g., port 8080), specify the port with the -p option:

nikto -h http://example.com -p 8080

d) Save Results to a File

You can save the scan results to a file (e.g., in HTML, CSV, or TXT format):

nikto -h http://example.com -o results.html

To save in CSV format:

nikto -h http://example.com -o results.csv -Format csv

e) Scan Multiple Hosts

Nikto can also scan multiple hosts at once, either by using a file with a list of targets or by specifying multiple domains:

nikto -h http://example1.com -h http://example2.com

Or, use a file with a list of IPs/hosts:

nikto -h < targets.txt

Where targets.txt contains one target per line.

Tip solutie

Permanent

Voteaza

(8 din 21 persoane apreciaza acest articol)

Despre Autor

Leave A Comment?