Nikto是一款Web安全掃描工具,能夠掃描指定主機的web類型,主機名,特定目錄,cookie,特定CGI漏洞,XSS漏洞,SQL注入漏洞等,很是強大滴說。。。web
root@xi4ojin:~# cd /pentest/web/nikto/安全
root@xi4ojin:/pentest/web/nikto# lscookie
docs nikto.conf nikto.pl plugins templateside
root@xi4ojin:/pentest/web/nikto# ./nikto.pl -h工具
Option host requires an argumentui
-config+ Use this config filethis
-Cgidirs+ scan these CGI dirs: ‘none’, ‘all’, or values like 「/cgi/ /cgi-a/」.net
-dbcheck check database and other key files for syntax errors插件
-Display+ Turn on/off display outputs日誌
-evasion+ ids evasion technique
-Format+ save file (-o) format
-host+ target host
-Help Extended help information
-id+ Host authentication to use, format is id:pass or id:pass:realm
-list-plugins List all available plugins
-mutate+ Guess additional file names
-mutate-options+ Provide extra information for mutations
-output+ Write output to this file
-nocache Disables the URI cache
-nossl Disables using SSL
-no404 Disables 404 checks
-port+ Port to use (default 80)
-Plugins+ List of plugins to run (default: ALL)
-root+ Prepend root value to all requests, format is /directory
-ssl Force ssl mode on port
-Single Single request mode
-timeout+ Timeout (default 2 seconds)
-Tuning+ Scan tuning
-update Update databases and plugins from CIRT.net
-vhost+ Virtual host (for Host header)
-Version Print plugin and database versions
+ requires a value
Note: This is the short help output. Use -H for full help.
升級插件
root@xi4ojin:/pentest/web/nikto# ./nikto.pl -update
-h 指定掃描的目標 –p 端口
root@xi4ojin:/pentest/web/nikto# ./nikto.pl -h www.xiaojin.org -p 80
-C 指定CGI目錄 –all表示猜解CGI目錄
root@xi4ojin:/pentest/web/nikto# ./nikto.pl -h www.xiaojin.org -C all
-T選項包含不少小選項 –T 9表示掃描SQL注入漏洞
root@xi4ojin:/pentest/web/nikto# ./nikto.pl -h www.xiaojin.org -T 9
-D指定輸出顯示2顯示cookies
root@xi4ojin:/pentest/web/nikto# ./nikto.pl -h www.xiaojin.org -D 2
-T選項包含的小選項解釋:
0 檢查文件上傳頁面
1 檢查web日誌
2 檢查錯誤配置或默認文件
3檢查信息泄露問題
4 檢查XSS/Script/HTML問題
5 從根目錄檢查是否存在可訪問的文件
6 檢查拒絕服務問題
7 從任意文件檢索是否存在可訪問文件
8 檢查是否存在系統命令執行漏洞
9 檢查SQL注入漏洞
a 檢查認證繞過問題
b 識別安裝的軟件版本
c 檢查源代碼泄露問題
x 反向連接選項
本文摘自獨自等待博客