Checando vulnerabilidades com o Nikto
Neste artigo vou mostrar como instalar, atualizar e usar o Nikto. Este programa é um scanner de vulnerabilidades bastante simples e fácil de usar.
[ Hits: 67.000 ]
Por: Perfil removido em 12/07/2006
-***** SSL support not available (see docs for SSL install instructions) ***** --------------------------------------------------------------------------- - Nikto 1.35/1.36 - www.cirt.net + Target IP: 192.168.131.1 + Target Hostname: 192.168.131.1 + Target Port: 80 + Start Time: Tue Jun 6 21:10:44 2006 --------------------------------------------------------------------------- - Scan is dependent on "Server" string which can be faked, use -g to override + Server: Apache/2.0.52 (Fedora) + Allowed HTTP Methods: GET,HEAD,POST,OPTIONS,TRACE + HTTP method 'TRACE' is typically only used for debugging. It should be disabled. OSVDB-877. + Apache/2.0.52 appears to be outdated (current is at least Apache/2.0.55). Apache 1.3.33 is still maintained and considered secure. + /cgi-bin/.htaccess - Contains authorization information (GET) + /icons/ - Directory indexing is enabled, it should only be enabled for specific directories (if required). If indexing is not used, the /icons directory should be removed. (GET) + /index.html.var - Apache default foreign language file found. All default files should be removed from the web server as they may give an attacker additional system information. (GET) + /manual/images/ - Apache 2.0 directory indexing is enabled, it should only be enabled for specific directories (if required). Apache's manual should be removed and directory indexing disabled. (GET) + /cgi-bin/.htaccess.old - Backup/Old copy of .htaccess - Contains authorization information (GET) + /cgi-bin/.htaccess.save - Backup/Old copy of .htaccess - Contains authorization information (GET) + /cgi-bin/.htaccess - Contains authorization information (GET) + /cgi-bin/.htaccess~ - Backup/Old copy of .htaccess - Contains authorization information (GET) + /cgi-bin/.htpasswd - Contains authorization information (GET) + /.htaccess - Contains authorization information (GET) + /.htpasswd - Contains authorization information (GET) + / - TRACE option appears to allow XSS or credential theft. See http://www.cgisecurity.com/whitehat-mirror/WhitePaper_screen.pdf for details (TRACE) + /manual/ - Web server manual? tsk tsk. (GET) + /webmail/ - Redirects to src/login.php , Web based mail package installed. + The IBM Web Traffic Express Caching Proxy is vulnerable to Cross Site Scripting (XSS). CA-2000-02. (GET) + /webmail/src/read_body.php - This might be interesting... has been seen in web logs from an unknown scanner. (GET) + 2670 items checked - 15 item(s) found on remote host(s) + End Time: Tue Jun 6 21:10:50 2006 (6 seconds) --------------------------------------------------------------------------- + 1 host(s) testedAgora basta avaliar as opções de uso de Nikto e criar o relatório com as vulnerabilidades encontradas no seu sistema.
Configuração do serviço NTP em servidor cliente
Configurando o aMSN para Lan House e/ou Cyber Café
VPN com openVPN no Slackware 11
Instalação e configuração do Ubuntu Gusty Gibbon na linha de notebooks HP/Compaq
Proxy reverso com ModSecurity no Debian Etch
Monitoramento de redes com o Zenoss
Política de Segurança para Dispositivos Móveis
Explorando celulares Android via Web com airbase-ng
Como atualizar sua versão estável do Debian
Cirurgia para acelerar o openSUSE em HD externo via USB
Void Server como Domain Control
Script de montagem de chroot automatica
Atualizar Linux Mint 22.2 para 22.3 beta
Jogar games da Battle.net no Linux com Faugus Launcher
Como fazer a Instalação de aplicativos para acesso remoto ao Linux
Instalar Dual Boot, Linux+Windows. (5)
Conky, alerta de temperatura alta (16)
De volta para o futuro - ou melhor, para o presente (parte 2) (3)









