Sample report

advertisement
Pentest-Tools.comReport
WebServerVulnerabilityScanwithNikto
Testparameters:
-WebsiteURL http://projects.xxxxxxxx.com/portal/
Testdate:28-Jul-2015,17:21:16
Testresult:
-Niktov2.1.6
--------------------------------------------------------------------------+TargetIP:89.x.x.53
+TargetHostname:projects.xxxxxxxx.com
+TargetPort:80
+TargetPath:/portal
+StartTime:2015-07-2817:21:16(GMT3)
--------------------------------------------------------------------------+Server:Apache/2.2.14(Win32)DAV/2mod_ssl/2.2.14OpenSSL/0.9.8lmod_autoindex_colorPHP/5.3.1mod_apreq2-20090110/2.7.1mod_perl/2.0.4Perl/v5.10.1
+Retrievedx-powered-byheader:PHP/5.3.1
+Theanti-clickjackingX-Frame-Optionsheaderisnotpresent.
+TheX-XSS-Protectionheaderisnotdefined.ThisheadercanhinttotheuseragenttoprotectagainstsomeformsofXSS
+TheX-Content-Type-Optionsheaderisnotset.ThiscouldallowtheuseragenttorenderthecontentofthesiteinadifferentfashiontotheMIMEtype
+ServerleaksinodesviaETags,headerfoundwithfile/index.html,inode:281474976717305,size:44,mtime:SunDec2000:00:002009
+PHP/5.3.1appearstobeoutdated(currentisatleast5.6.9).PHP5.5.25and5.4.41arealsocurrent.
+OpenSSL/0.9.8lappearstobeoutdated(currentisatleast1.0.1j).OpenSSL1.0.0oand0.9.8zcarealsocurrent.
+Perl/v5.10.1appearstobeoutdated(currentisatleastv5.14.2)
+mod_ssl/2.2.14appearstobeoutdated(currentisatleast2.8.31)(maydependonserverversion)
+mod_perl/2.0.4appearstobeoutdated(currentisatleast2.0.7)
+Apache/2.2.14appearstobeoutdated(currentisatleastApache/2.4.12).Apache2.0.65(finalrelease)and2.2.29arealsocurrent.
+Apachemod_negotiationisenabledwithMultiViews,whichallowsattackerstoeasilybruteforcefilenames.Seehttp://www.wisec.it/sectou.php?id=4698ebdc59d15.
+OSVDB-877:HTTPTRACEmethodisactive,suggestingthehostisvulnerabletoXST
+mod_ssl/2.2.14OpenSSL/0.9.8lmod_autoindex_colorPHP/5.3.1mod_apreq2-20090110/2.7.1mod_perl/2.0.4Perl/v5.10.1-mod_ssl2.8.7andlowerarevulnerabletoaremotebufferoverflow.
+OSVDB-682:/webalizer/:Webalizermaybeinstalled.Versionslowerthan2.01-09vulnerabletoCrossSiteScripting(XSS).
+OSVDB-12184:/?=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000:PHPrevealspotentiallysensitiveinformationviacertainHTTPrequeststhatcontainspecificQUERYstrings.
+OSVDB-12184:/?=PHPE9568F36-D428-11d2-A769-00AA001ACF42:PHPrevealspotentiallysensitiveinformationviacertainHTTPrequeststhatcontainspecificQUERYstrings.
+OSVDB-12184:/?=PHPE9568F34-D428-11d2-A769-00AA001ACF42:PHPrevealspotentiallysensitiveinformationviacertainHTTPrequeststhatcontainspecificQUERYstrings.
+OSVDB-12184:/?=PHPE9568F35-D428-11d2-A769-00AA001ACF42:PHPrevealspotentiallysensitiveinformationviacertainHTTPrequeststhatcontainspecificQUERYstrings.
+OSVDB-561:/server-status:ThisrevealsApacheinformation.CommentoutappropriatelineintheApacheconffileorrestrictaccesstoallowedsources.
+OSVDB-3092:/phpmyadmin/changelog.php:phpMyAdminisformanagingMySQLdatabases,andshouldbeprotectedorlimitedtoauthorizedhosts.
+OSVDB-3092:/phpmyadmin/ChangeLog:phpMyAdminisformanagingMySQLdatabases,andshouldbeprotectedorlimitedtoauthorizedhosts.
+OSVDB-3268:/test/:Directoryindexingfound.
+OSVDB-3092:/test/:Thismightbeinteresting...
+OSVDB-3268:/icons/:Directoryindexingfound.
+OSVDB-562:/server-info:ThisgivesalotofApacheinformation.Commentoutappropriatelineinhttpd.conforrestrictaccesstoallowedhosts.
+OSVDB-3233:/icons/README:Apachedefaultfilefound.
+OSVDB-3092:/.svn/wc.db:SubversionSQLiteDBfilemaycontaindirectorylistinginformation.Seehttp://pen-testing.sans.org/blog/pen-testing/2012/12/06/all-your-svn-are-belong-to-us
+OSVDB-3092:/phpmyadmin/Documentation.html:phpMyAdminisformanagingMySQLdatabases,andshouldbeprotectedorlimitedtoauthorizedhosts.
+/server-status:Apacheserver-statusinterfacefound(passprotected)
+/server-info:Apacheserver-infointerfacefound(passprotected)
+8494requests:0error(s)and31item(s)reportedonremotehost
+EndTime:2015-07-2817:35:39(GMT3)(863seconds)
--------------------------------------------------------------------------+1host(s)tested
Download