My First Website Scan with Nikto, I Need Help.

Jul 18, 2017 11:37 PM

Hi guys, how do i use the vulnerabilities of this site? Can one of these vulnerabilities be used to hack the site? (I have permission for testing the site)

Here is the output:

---------------------------------------------------------------------------

---------------------------------------------------------------------------

  • Server: Apache/2.2.31 (Unix) modssl/2.2.31 OpenSSL/1.0.1e-fips modbwlimited/1.4
  • Retrieved x-powered-by header: PHP/5.4.45
  • The anti-clickjacking X-Frame-Options header is not present.
  • The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
  • The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
  • All CGI directories 'found', use '-C none' to test none
  • Server leaks inodes via ETags, header found with file /robots.txt, inode: 452063, size: 1777, mtime: Sun Jun 12 11:14:32 2016
  • Entry '/INSTALL.mysql.txt' in robots.txt returned a non-forbidden or redirect HTTP code (200)
  • Entry '/INSTALL.pgsql.txt' in robots.txt returned a non-forbidden or redirect HTTP code (200)
  • Entry '/install.php' in robots.txt returned a non-forbidden or redirect HTTP code (200)
  • Entry '/LICENSE.txt' in robots.txt returned a non-forbidden or redirect HTTP code (200)
  • Entry '/MAINTAINERS.txt' in robots.txt returned a non-forbidden or redirect HTTP code (200)
  • Entry '/update.php' in robots.txt returned a non-forbidden or redirect HTTP code (302)
  • Entry '/UPGRADE.txt' in robots.txt returned a non-forbidden or redirect HTTP code (200)
  • "robots.txt" contains 41 entries which should be manually viewed.
  • Apache/2.2.31 appears to be outdated (current is at least Apache/2.4.12). Apache 2.0.65 (final release) and 2.2.29 are also current.
  • OpenSSL/1.0.1e-fips appears to be outdated (current is at least 1.0.1j). OpenSSL 1.0.0o and 0.9.8zc are also current.
  • mod_ssl/2.2.31 appears to be outdated (current is at least 2.8.31) (may depend on server version)
  • Multiple index files found: /index.htm, /default.htm
  • OSVDB-877: HTTP TRACE method is active, suggesting the host is vulnerable to XST
  • modssl/2.2.31 OpenSSL/1.0.1e-fips modbwlimited/1.4 - mod_ssl 2.8.7 and lower are vulnerable to a remote buffer overflow which may allow a remote shell. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0082, OSVDB-756.
  • /cgi-sys/formmail.pl: Many versions of FormMail have remote vulnerabilities, including file access, information disclosure and email abuse. FormMail access should be restricted as much as possible or a more secure solution found.
  • /global.asa: The global.asa file was retrieved, which may contain sensitive information. Map the .asa extension to the proper dll.
  • /webmail/blank.html: IlohaMail 0.8.10 contains an XSS vulnerability. Previous versions contain other non-descript vulnerabilities.
  • /securecontrolpanel/: Web Server Control Panel
  • /webmail/: Web based mail package installed.
  • /phpinfo.php?VARIABLE=: Output from the phpinfo() function was found.
  • /cgi-sys/Count.cgi: This may allow attackers to execute arbitrary commands on the server
  • /php.ini: This file should not be available through the web interface.
  • OSVDB-3233: /mailman/listinfo: Mailman was found on the server.
  • OSVDB-3233: /postinfo.html: Microsoft FrontPage default file found.
  • OSVDB-12184: /?=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings.
  • OSVDB-12184: /?=PHPE9568F36-D428-11d2-A769-00AA001ACF42: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings.
  • OSVDB-12184: /?=PHPE9568F34-D428-11d2-A769-00AA001ACF42: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings.
  • OSVDB-12184: /?=PHPE9568F35-D428-11d2-A769-00AA001ACF42: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings.
  • OSVDB-2117: /cpanel/: Web-based control panel
  • OSVDB-3092: /img-sys/: Default image directory should not allow directory listing.
  • OSVDB-3092: /java-sys/: Default Java directory should not allow directory listing.
  • OSVDB-3093: /webmail/lib/emailreaderexecuteoneachpage.inc.php: This might be interesting... has been seen in web logs from an unknown scanner.
  • OSVDB-3233: /vtiinf.html: FrontPage/SharePoint is installed and reveals its version number (check HTML source for more information).
  • /phpinfo.php: Output from the phpinfo() function was found.
  • OSVDB-3233: /phpinfo.php: PHP is installed, and a test script which runs phpinfo() was found. This gives a lot of system information.
  • /phpinfo.php?GLOBALStest=: Output from the phpinfo() function was found.
  • /phpinfo.php?cx=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: Output from the phpinfo() function was found.
  • OSVDB-3092: /UPGRADE.txt: Default file found.
  • OSVDB-3092: /install.php: Drupal install.php file found.
  • OSVDB-3092: /install.php: install.php file found.
  • OSVDB-3092: /LICENSE.txt: License file found may identify site software.
  • OSVDB-3233: /INSTALL.mysql.txt: Drupal installation file found.
  • OSVDB-3233: /INSTALL.pgsql.txt: Drupal installation file found.
  • /controlpanel/: Admin login page/section found.

Just updated your iPhone? You'll find new Apple Intelligence capabilities, sudoku puzzles, Camera Control enhancements, volume control limits, layered Voice Memo recordings, and other useful features. Find out what's new and changed on your iPhone with the iOS 18.2 update.

Related Articles

637263493835297420.jpg

How to Use Zero-Width Characters to Hide Secret Messages in Text (& Even Reveal Leaks)

636455706472146367.jpg

How to Hide DDE-Based Attacks in MS Word

Comments

No Comments Exist

Be the first, drop a comment!