NIKTO(1) | Vulnerability Scanner | NIKTO(1) |
NAME
nikto - Scan web server for known vulnerabilities
SYNOPSIS
nikto [options...]
DESCRIPTION
Examine a web server to find potential problems and security vulnerabilities, including:
Nikto is built on LibWhisker (by RFP) and can run on any platform which has a Perl environment. It supports SSL, proxies, host authentication, attack encoding and more. It can be updated automatically from the command-line, and supports the optional submission of updated version data back to the maintainers.
OPTIONS
Below are all of the Nikto command line options and explanations. A brief version of this text is available by running Nikto with the -H (-Help) option.
-Cgidirs
-config
-dbcheck
-Display
1 - Show redirects
2 - Show cookies received
3 - Show all 200/OK responses
4 - Show URLs which require authentication
D - Debug Output
V - Verbose Output
-evasion
1 - Random URI encoding (non-UTF8)
2 - Directory self-reference (/./)
3 - Premature URL ending
4 - Prepend long random string
5 - Fake parameter
6 - TAB as request spacer
7 - Change the case of the URL
8 - Use Windows directory separator (\)
A - Use a carriage return (0x0d) as a request spacer
B - Use binary value 0x0b as a request spacer
-findonly
-Format
csv - a comma-seperated list
htm - an HTML report
txt - a text report
xml - an XML report
-host
-Help
-id
-list-plugins
The output format is:
Plugin name
full name - description
Written by author, Copyright (C) copyright
-mutate
1 - Test all files with all root directories
2 - Guess for password file names
3 - Enumerate user names via Apache (/~user type requests)
4 - Enumerate user names via cgiwrap (/cgi-bin/cgiwrap/~user type requests)
5 - Attempt to brute force sub-domain names, assume that the host name is the parent domain
6 - Attempt to guess directory names from the supplied dictionary file
-mutate-options
-nointeractive
-nolookup
-nossl
-no404
-output
-plugins
There are two special entries: ALL, which specifies all plugins shall be run and NONE, which specifies no plugins shall be run. The default is ALL
-port
-Pause
-root
-ssl
-Single
-timeout
-Tuning
0 - File Upload
1 - Interesting File / Seen in logs
2 - Misconfiguration / Default File
3 - Information Disclosure
4 - Injection (XSS/Script/HTML)
5 - Remote File Retrieval - Inside Web Root
6 - Denial of Service
7 - Remote File Retrieval - Server Wide
8 - Command Execution / Remote Shell
9 - SQL Injection
a - Authentication Bypass
b - Software Identification
c - Remote Source Inclusion
x - Reverse Tuning Options (i.e., include all except specified)
The given string will be parsed from left to right, any x characters will apply to all characters to the right of the character.
-useproxy
-update
-Version
-vhost
FILES
nikto.conf
${NIKTO_DIR}/plugins/db*
${NIKTO_DIR}/plugins/*.plugin
${NIKTO_DIR}/templates
BUGS
The current features are not supported:
AUTHORS
Nikto is written and maintained by Chris Sullo and David Lodge. See the main documentation for other contributors.
All code is Copyright CIRT, Inc., except LibWhisker which is Copyright (c) 2009, Jeff Forristal (wiretrip.net). Other portions of code may be (C) as specified.
SEE ALSO
Nikto Homepage[1]
NOTES
- 1.
- Nikto Homepage
02/03/2010 | http://cirt.net/ 2.1 |