元经纪 - 元宇宙与人工智能领域相关产品与服务一站式采购平台

400-6166692

Nikto:可作为一种常用的渗透测试工具

分类:开源 时间:2023-06-21 06:59 浏览:782
概述
Nikto可以作为一种常用的渗透测试工具。 Nikto是一种开源web服务器扫描器,可以用于快速识别和报告目标网站上存在的安全漏洞和配置错误。它可以自动执行多种web应用安全测试,包括常见的漏洞检测、文件上传、SQL注入等,并生成详细的报告。使用Nikto可以帮助安全专业人员更快速地发现和修复网站上的安全漏洞,从而提高网站的安全性。
内容

概述

Nikto可以作为一种常用的渗透测试工具。 Nikto是一种开源web服务器扫描器,可以用于快速识别和报告目标网站上存在的安全漏洞和配置错误。它可以自动执行多种web应用安全测试,包括常见的漏洞检测、文件上传、SQL注入等,并生成详细的报告。使用Nikto可以帮助安全专业人员更快速地发现和修复网站上的安全漏洞,从而提高网站的安全性。

正常运行:

git clone https://github.com/sullo/nikto

# Main script is in program/
cd nikto/program

# Check out the 2.5.0 branch
git checkout nikto-2.5.0

# Run using the shebang interpreter
./nikto.pl -h http://www.example.com

# Run using perl (if you forget to chmod)
perl nikto.pl -h http://www.example.com

[hidecontent type="logged" desc="隐藏内容:登录后可查看"]

作为 Docker 容器运行:

git clone https://github.com/sullo/nikto.git
cd nikto
docker build -t sullo/nikto .

# Call it without arguments to display the full help
docker run --rm sullo/nikto

# Basic usage
docker run --rm sullo/nikto -h http://www.example.com

# To save the report in a specific format, mount /tmp as a volume:
docker run --rm -v $(pwd):/tmp sullo/nikto -h http://www.example.com -o /tmp/out.json

基本用法:

   Options:
       -ask+               Whether to ask about submitting updates
                               yes   Ask about each (default)
                               no    Don't ask, don't send
                               auto  Don't ask, just send
       -Cgidirs+           Scan these CGI dirs: "none", "all", or values like "/cgi/ /cgi-a/"
       -config+            Use this config file
       -Display+           Turn on/off display outputs:
                               1     Show redirects
                               2     Show cookies received
                               3     Show all 200/OK responses
                               4     Show URLs which require authentication
                               D     Debug output
                               E     Display all HTTP errors
                               P     Print progress to STDOUT
                               S     Scrub output of IPs and hostnames
                               V     Verbose output
       -dbcheck           Check database and other key files for syntax errors
       -evasion+          Encoding technique:
                               1     Random URI encoding (non-UTF8)
                               2     Directory self-reference (/./)
                               3     Premature URL ending
                               4     Prepend long random string
                               5     Fake parameter
                               6     TAB as request spacer
                               7     Change the case of the URL
                               8     Use Windows directory separator (\)
                               A     Use a carriage return (0x0d) as a request spacer
                               B     Use binary value 0x0b as a request spacer
        -Format+           Save file (-o) format:
                               csv   Comma-separated-value
                               htm   HTML Format
                               msf+  Log to Metasploit
                               nbe   Nessus NBE format
                               txt   Plain text
                               xml   XML Format
                               (if not specified the format will be taken from the file extension passed to -output)
       -Help              Extended help information
       -host+             Target host
       -IgnoreCode        Ignore Codes--treat as negative responses
       -id+               Host authentication to use, format is id:pass or id:pass:realm
       -key+              Client certificate key file
       -list-plugins      List all available plugins, perform no testing
       -maxtime+          Maximum testing time per host
       -mutate+           Guess additional file names:
                               1     Test all files with all root directories
                               2     Guess for password file names
                               3     Enumerate user names via Apache (/~user type requests)
                               4     Enumerate user names via cgiwrap (/cgi-bin/cgiwrap/~user type requests)
                               5     Attempt to brute force sub-domain names, assume that the host name is the parent domain
                               6     Attempt to guess directory names from the supplied dictionary file
       -mutate-options    Provide information for mutates
       -nointeractive     Disables interactive features
       -nolookup          Disables DNS lookups
       -nossl             Disables the use of SSL
       -no404             Disables nikto attempting to guess a 404 page
       -output+           Write output to this file ('.' for auto-name)
       -Pause+            Pause between tests (seconds, integer or float)
       -Plugins+          List of plugins to run (default: ALL)
       -port+             Port to use (default 80)
       -RSAcert+          Client certificate file
       -root+             Prepend root value to all requests, format is /directory
       -Save              Save positive responses to this directory ('.' for auto-name)
       -ssl               Force ssl mode on port
       -Tuning+           Scan tuning:
                               1     Interesting File / Seen in logs
                               2     Misconfiguration / Default File
                               3     Information Disclosure
                               4     Injection (XSS/Script/HTML)
                               5     Remote File Retrieval - Inside Web Root
                               6     Denial of Service
                               7     Remote File Retrieval - Server Wide
                               8     Command Execution / Remote Shell
                               9     SQL Injection
                               0     File Upload
                               a     Authentication Bypass
                               b     Software Identification
                               c     Remote Source Inclusion
                               x     Reverse Tuning Options (i.e., include all except specified)
       -timeout+          Timeout for requests (default 10 seconds)
       -Userdbs           Load only user databases, not the standard databases
                               all   Disable standard dbs and load only user dbs
                               tests Disable only db_tests and load udb_tests
       -until             Run until the specified time or duration
       -update            Update databases and plugins from CIRT.net
       -useproxy          Use the proxy defined in nikto.conf
       -Version           Print plugin and database versions
       -vhost+            Virtual host (for Host header)
              + requires a value

Nikto 网络服务器扫描仪 - https://cirt.net/Nikto2

完整文档 - https://github.com/sullo/nikto/wiki

执照

版权所有 (C) 2001 Chris Sullo

该程序是免费软件;您可以根据自由软件基金会发布的 GNU 通用公共许可证的条款重新分发和/或修改它;仅限许可证的版本 2。

分发该程序是希望它有用,但不提供任何保证;甚至没有针对特定用途的适销性或适用性的默示保证。有关详细信息,请参阅 GNU 通用公共许可证。

您应该随本程序一起收到 GNU 通用公共许可证的副本;如果没有,请写信给美国马萨诸塞州波士顿市富兰克林街 51 号 Fifth Floor 02110-1301 的自由软件基金会。

 

[/hidecontent]

微信客服
返回顶部