📄 nikto-1.34.man
字号:
.TH Nikto 1 "November 05, 2003" "Nikto 1.34" ""..SH NAME.\fBNikto\fP - Web Server and CGI Scanner, Version 1.34..SH SYNOPSIS.\fBnikto.pl\fP [\-h \fItarget\fP] [\fIoptions\fP]..SH WARNING.Nikto is a tool for finding default web files and examing web server andCGI security. It makes a lot of reqeusts to the remote server, which insome cases may cause the server to crash. It may also be illegal to usethis software against servers you do not have permission to do test...SH DESCRIPTION.Nikto is designed to examine web servers and look for items in multiplecategories:.RS.IP \(bu 3misconfigurations.IP \(bu 3default files and scripts.IP \(bu 3insecure files and scripts.IP \(bu 3outdated software.RE.PPIt uses Rain Forest Puppy's LibWhisker (wiretrip.net) for HTTPfunctionality, and can perform checks in HTTP or HTTPS. It also supportsbasic port scanning and will determine if a web server is running on anyopen ports..PPNikto checks and code can be automatically udpated from the maindistribution server by using the \fB\-update\fP option (see below) to ensureNikto is checking the most recent vulnerabilities..PPNikto will also load user defined checks at startup if they are placedin a file named \fIuser_scan_database.db\fP in the plugins directory.Unlike \fIscan_database.db\fP, this file will not be over-written if the\fB\-update\fP option is used. This should always be used if you addyour own checks (and you should send those checks to sullo@cirt.net)..PPNikto leaves a footprint on a server it scans--both in an invalid 404check and in the User-Agent header. This can be changed by forcing the\fB$NIKTO{fingerprint}\fP and \fB$NIKTO{useragent}\fP to new values inthe source code, \fBor\fP, if any IDS evasion (\fB\-e\fP) option isused. Note that it's pretty obvious when Nikto is scanning a serveranyway--the large number of invalid requests sticks out a lot in theserver logs, although with an IDS evasion technique it might not beextremely obvious that it was Nikto..PPWhy the name Nikto? See the movies \fI"The Day the Earth StoodStill"\fP and, of course \fI"Army of Darkness"\fP for the answer. Fora full list of pop-culture references to this, seehttp://www.blather.net/archives2/issue2no21.html which has a lot ofgood information...SH OPTIONS.The options listed below are all optional except the \fB\-h\fP targetspecification. They can all be abbreviated to the first letter (i.e.,\fB\-m\fP for \fB\-mutate\fP), with the exception of \fB\-verbose\fPand \fB\-debug\fB..TP.BI \-config " <config file>"Read the specified configuration file instead of the default one..TP.BI \-Cgidirs " <dirs>"Optionally force the CGI directories to scan. Valid values are 'none' tonot check any, 'all' to force scan all CGi directories (like the deprecated\fB\-allcgi\fP), or a value to use as the CGI directory, i.e. '/cgi/'..TP.B \-cookiesPrint out the cookie names and values that were received during the scan..TP.BI \-evasion " <evasion method>"IDS evasion techniques. This enables the intrusion detection evasion inLibWhisker. Multiple options can be used by stringing the numberstogether, i.e. to enable methods 1 and 5, use "\-e 15". The valid optionsare (use the number preceeding each description):.RS.TP.B 1Random URI encoding (non-UTF8).TP.B 2Add directory self-reference\~/./.TP.B 3Premature URL ending.TP.B 4Prepend long random string to request.TP.B 5Fake parameters to files.TP.B 6TAB as request spacer instead of spaces.TP.B 7Random case sensitivity.TP.B 8Use Windows directory separator\~\\ instead of\~/.TP.B 9Session splicing.PPSee the LibWhisker source for more information, or http://www.wiretrip.net/.RE.TP.B \-findonlyUse port scan to find valid HTTP and HTTPS ports only, but do not performchecks against them..TP.B \-FormatOutput format for the file specified with the -output option. Valid formatsare:.RS.TP.B HTMHTML output format..TP.B TXTText output format. This is the default if \fB\-F\fP is not specified..TP.B CSVComma Seperated Value format..RE.TP.B \-genericForce full scan rather than trusting the "Server:" identification string,as many servers allow this to be changed..TP.BI \-host " <ip, hostname or file>"Target host(s) to check against. This can be an IP address orhostname, or a file of IPs or hostnames. If this argument is a file,it should formatted as described below. This is the only requiredoption..TP.BI \-id " <user:password:realm>"HTTP Authentication use, format is userid:password for authorizingNikto a web server realm. For NTLM realms, format isid:password:realm..TP.BI \-mutateMutate checks. This causes Nikto put all files with all directoriesfrom the .db files and can the host. You might find some oddities thisway. Note that it generates a lot of checks..TP.BI \-nolookupDon't perform a host name lookup..TP.BI \-output " <filename>"Write output to this file when complete. Format is text unless specifiedvia \fB\-Format\fP..TP.BI \-port " <port number>"Port number to scan, defaults to port 80 if missing. This can also bea range or list of ports, which Nikto will check for web servers. Ifa web server is found, it will perform a full scan unless the\fB\-f\fP option is used..TP.BI \-root " <root>"Always prepend this to requests, i.e., changes a request of "/password.txt"to "/directory/password.txt" (assuming the value passed on the CLI was"/directory").TP.B \-sslForce SSL mode on port(s) listed. Note that Nikto attempts to determine ifa port is HTTP or HTTPS automatically, but this can be slow if the serverfails to respond or is slow to respond to the incorrect one. This sets SSLusage for \fBall\fP hosts and ports..TP.B \-timeout " <timeout>"Set timeout for each request, default is 10 seconds.TP.B \-useproxyUse the proxy defined in \fIconfig.txt\fP for all requests.TP.BI \-vhost " <ip or hostname>"Virtual host to use for the "Host:" header, in case it is different fromthe target..TP.B \-VersionPrint version numbers of Nikto, all plugins and all databases..PPThese options cannot be abbreviated to the first letter:.TP.B \-dbcheckThis option will check the syntax of the checks in the\fIscan_database.db\fP and \fIuser_scan_database.db\fP files. This isreally only useful if you are adding checks or are having problems..TP.B \-debugPrint a huge amount of detail out. In most cases this is going to be moreinformation than you need, so try \fB\-verbose\fP first..TP.B \-updateThis will connect to cirt.net and download updated scan_database.db andplugin files. Use this with caution as you are downloading files--perhapsincluding code--from an "untrusted" source. This option cannot be combinedwith any other, but required variables (like the \fBPROXY\fP settings)will be loaded from the \fIconfig.txt\fP file..TP.B \-verbosePrint out a lot of extra data during a run. This can be useful if a scan orserver is failing, or to see exactly how a server responds to each request...SH HOSTNAME FILE.If a file is specified with \fB\-h\fP instead of a hostname or IP, Niktowill open the file to use it as a list of targets. The file should beformatted with one host per line. If no port is specified, port 80 isassumed. Multiple ports may be specified per host. If a host file is used,any ports specified via \fB\-p\fP are added to every host. Valid lines wouldbe:.PP.RS10.100.100.100.br10.100.100.100:443.br10.100.100.100,443.br10.100.100.100:443:8443.br10.100.100.100,443,8443.brevilash.example.com,80.br(etc).RE..SH CONFIG FILE.The \fIconfig.txt\fP file provides a means to set variables atrun-time without modifying the Nikto source itself. The options belowcan be set in the file. Options that accept multiple values(\fBCGIDIRS\fP, \fBSKIPPORTS\fP, etc.) should just use a space todistinguish multiple values. None of these are required unless youneed them..TP.B CLIOPTSAdd any option here to be added to every Nikto execution, whether specifiedat the command line or not..TP.B NMAPPath to nmap. If defined, Nikto will use nmap to port scan a host ratherthan PERL code, and so should be faster..TP.B SKIPPORTSPort number never to scan (so you don't crash services, perhaps?)..TP.B PROXYHOSTServer to use as a proxy, either IP or hostname, no 'http://' needed..TP.B PROXYPORTPort number that \fBPROXYHOST\fP uses as a proxy..TP.B PROXYUSERIf the \fBPROXYHOST\fP requires authentication, use this ID. Nikto willprompt for it if this is not set & it is needed..TP.B PROXYPASS
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -