Nikto y Skipfish
Alguna otra alternativa que podriamos probar seran estas herramientas llamadas Nikto
y Skipfish
que tambien soon muy buenas para encontrar vulnerabilidades web.
Nikto
viene por defecto en kali
, esta herramienta es muy sencillita de utilizar, si por ejemplo queremos investigar la siguiente URL
, haremos lo siguiente:
nikto -h http://192.168.5.211:8080 -o report.html -Format html
Lo que hacemos con -o
es generar un reporte de lo que encuentre. Con el -Format
es el formato que queremos para el reporte en mi caso HTML
.
Info:
- Nikto v2.5.0
---------------------------------------------------------------------------
+ Target IP: 192.168.5.211
+ Target Hostname: 192.168.5.211
+ Target Port: 8080
+ Start Time: 2025-01-31 04:49:28 (GMT-5)
---------------------------------------------------------------------------
+ Server: Apache/2.4.7 (Ubuntu)
+ /: Retrieved x-powered-by header: PHP/5.5.9-1ubuntu4.14.
+ /: The anti-clickjacking X-Frame-Options header is not present. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options
+ /: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/
+ Root page / redirects to: portal.php
+ /passwords/: Directory indexing found.
+ /robots.txt: Entry '/passwords/' is returned a non-forbidden or redirect HTTP code (200). See: https://portswigger.net/kb/issues/00600600_robots-txt-file
+ /documents/: Directory indexing found.
+ /robots.txt: Entry '/documents/' is returned a non-forbidden or redirect HTTP code (200). See: https://portswigger.net/kb/issues/00600600_robots-txt-file
+ /robots.txt: Entry '/admin/' is returned a non-forbidden or redirect HTTP code (200). See: https://portswigger.net/kb/issues/00600600_robots-txt-file
+ /images/: Directory indexing found.
+ /robots.txt: Entry '/images/' is returned a non-forbidden or redirect HTTP code (200). See: https://portswigger.net/kb/issues/00600600_robots-txt-file
+ /robots.txt: contains 5 entries which should be manually viewed. See: https://developer.mozilla.org/en-US/docs/Glossary/Robots.txt
+ Apache/2.4.7 appears to be outdated (current is at least Apache/2.4.54). Apache 2.2.34 is the EOL for the 2.x branch.
+ /login.php: Cookie PHPSESSID created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies
+ /web.config: ASP config file is accessible.
+ /test.php?%3CSCRIPT%3Ealert('Vulnerable')%3C%2FSCRIPT%3E=x: OmniHTTPD's test.php is vulnerable to Cross Site Scripting (XSS). See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1455
+ /phpinfo.php: Output from the phpinfo() function was found.
+ /admin/: This might be interesting.
+ /apps/: Directory indexing found.
+ /apps/: This might be interesting.
+ /db/: Directory indexing found.
+ /db/: This might be interesting.
+ /passwords/: This might be interesting.
+ /stylesheets/: Directory indexing found.
+ /stylesheets/: This might be interesting.
+ /admin/index.php: This might be interesting: has been seen in web logs from an unknown scanner.
+ /phpinfo.php: PHP is installed, and a test script which runs phpinfo() was found. This gives a lot of system information. See: CWE-552
+ /admin/phpinfo.php: Output from the phpinfo() function was found.
+ /admin/phpinfo.php: Immobilier allows phpinfo() to be run. See: https://vulners.com/osvdb/OSVDB:35877
+ /config.inc: DotBr 0.1 configuration file includes usernames and passwords. See: OSVDB-5092
+ /update.php: Cookie admin created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies
+ /update.php: Cookie movie_genre created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies
+ /update.php: Cookie secret created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies
+ /update.php: Cookie top_security created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies
+ /update.php: Cookie top_security_nossl created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies
+ /update.php: Cookie top_security_ssl created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies
+ /install.php: install.php file found.
+ /icons/README: Apache default file found. See: https://www.vntweb.co.uk/apache-restricting-access-to-iconsreadme/
+ /login.php: Admin login page/section found.
+ /test.php: This might be interesting.
+ 8913 requests: 0 error(s) and 39 item(s) reported on remote host
+ End Time: 2025-01-31 04:49:49 (GMT-5) (21 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested
Vemos que nos muestra mucha informacion aqui, pero si ahora abrimos el archivo que nos genero de la siguiente forma:
sudo open report.html
Veremos que que nos muestra mucha mas informacion de forma que es mas visual que en la terminal, por lo que ya seria investigar.
Despues podremos ver la otra herramienta llamada Skipfish
que tambien esta por defecto en kali
.
skipfish -o report http://192.168.5.211:8080
Info:
skipfish version 2.10b by lcamtuf@google.com
- 192.168.5.211 -
Scan statistics:
Scan time : 0:00:05.893
HTTP requests : 18305 (3105.7/s), 31913 kB in, 4495 kB out (6177.2 kB/s)
Compression : 2428 kB in, 9913 kB out (60.6% gain)
HTTP faults : 0 net errors, 0 proto errors, 0 retried, 0 drops
TCP handshakes : 197 total (92.9 req/conn)
TCP faults : 0 failures, 0 timeouts, 11 purged
External links : 384 skipped
Reqs pending : 0
Database statistics:
Pivots : 79 total, 76 done (96.20%)
In progress : 0 pending, 0 init, 0 attacks, 3 dict
Missing nodes : 8 spotted
Node types : 1 serv, 8 dir, 50 file, 7 pinfo, 1 unkn, 12 par, 0 vall
Issues found : 31 info, 0 warn, 1 low, 0 medium, 0 high impact
Dict size : 78 words (78 new), 9 extensions, 256 candidates
Signatures : 77 total
[+] Copying static resources...
[+] Sorting and annotating crawl nodes: 79
[+] Looking for duplicate entries: 79
[+] Counting unique nodes: 60
[+] Saving pivot data for third-party tools...
[+] Writing scan description...
[+] Writing crawl tree: 79
[+] Generating summary views...
[+] Report saved to 'report/index.html' [0x9fa0d1ed].
[+] This was a great day for science!
Y con esto veremos que nos genero correctamente el reporte encontrando varias cosas, vamos abrir el reporte:
sudo open report/index.html
Info:
Vemos que nos lo muestra muchisimo mejor que nikto
por lo que son dos herramientas muy buenas para encontrar vulenrabilidades web.
Last updated