Nikto LUCA ALEXANDRA ADELA
Nikto Web server assessment tool Written by Chris Solo and David Lodge Released on December 27, 2001 Stable release: / December 17, 2012 Development status Active Written in Perl Open Source (GPL) Works natively on Linux, Apple Mac OS X, Microsoft Windows Requirements: system with basic Perl, Perl Modules, OpenSSL installation
Vulnerabilities Server and software misconfigurations Default files and programs Insecure files and programs Outdated servers and programs
Tests Over 6400 potentially dangerous files/CGIs Outdated versions of over 1250 servers Version specific problems on over 270 servers Server configuration items Captures and prints any cookies received Installed software and web servers
Features Supports SSL Supports full http proxy Supports text, HTML, XML and CSV to save reports. Scans multiple ports on a server or multiple servers via input file (including Nmap output) Easily updated via command line Thorough documentation It can be integrated in Nessus (Nessus can be configured to automatically launch Nikto when it finds a web server) Can log in to Metasploit Capable of sending data along with requests to servers (cross site scripting and SQL injection)
Advanced Error Detection Logic Most web security tools rely on the HTTP response to determine if a page or script exists Many servers do not properly adhere to RFC standards false-positives Nikto uses: - Standard RFC response - Content match - MD5 hash
Use Update ◦perl nikto.pl -update Run ◦perl nikto.pl -h Setting the display to verbose ◦perl nikto.pl -display V Save output to file ◦perl nikto.pl -h output results.html
Case studies Virtualization: Oracle VM VirtualBox OS: Kali Linux (64bit) Web vulnerability scanner: Nikto Tested software: Drupal Joomla OSCommerce Wordpress
Output - Drupal
Output - Joomla
Output - OSCommerce
Output - Wordpress
Nikto Advantages - Fast, versatile tool - Written in Perl, can be run in any host operating system - Open source - it can be easily extended and customized - Diverse output formats - easy to integrate with other penetration testing tools - Non-invasive scanner - doesn’t exploit vulnerabilities Disadvantages - Runs at the command line, without any graphical user interface
Sources scanner-for-web-servers/