[Nikto-discuss] Recent changes in trunk

David Klein davidkl at ivision.com.au
Sun Aug 2 22:30:17 UTC 2009

Hi David,

I agree, if a system has Nikto installed it will most likely have access
to NMAP as well. 

Personally I have never used Nikto to target more than one specific port
at a time, I guess it's a paranoia thing..


David Klein
-----Original Message-----
From: nikto-discuss-bounces at attrition.org
[mailto:nikto-discuss-bounces at attrition.org] On Behalf Of David Lodge
Sent: Saturday, August 01, 2009 9:38 PM
To: nikto-discuss at attrition.org
Subject: [Nikto-discuss] Recent changes in trunk

To fix the reporting bug I created earlier that was found by Jabra, I've

made some massive changes to the way Nikto handles targets and
a quick synopsis is below:
* Nikto will now work out and assign "marks" (the variable target had  
already been used :-) before it starts scanning
* Nikto will call reporter plugins for each item found
* Nikto will no longer use nmap to portscan ports

How you will see this when running nikto is that, the inputs to -host
-port have been changed. You used to be able to supply:
nikto.pl -host <file>
nikto.pl -host <url>
nikto.pl -host "hostname1 hostname2" -port 80-81

This now looks like:
nikto.pl -host hostname1,file,url -port port1,port2

Where the host list can be any number of hosts, urls or files containing

hosts or urls. If ports are supplied they are applied to all hosts/urls

which don't already have ports.

For example if we have the files host1.txt containing:

And host2.txt containing:

Then we can do:
nikto.pl -host host1.txt,host2.txt,arabella -port 80,443

This will set the marks as:

I ended up removing nmap from the code, as this was only use in certain

cases to do a prelude to a test that Nikto would do anyway. This removes

some functionality that would allow Nikto to do a portscan. In my
Nikto shouldn't be doing portscans, nmap (or your favourite portscanner)

can do a much better job than Nikto can do and I'd rather take a feed
nmap, rather than have Nikto spawn nmap, so instead of doing:
nikto.pl -host -port 80,443,8000-9000

We should do:
nmap -p80,443,8000-9000 -oG - | nikto.pl -host -

Nikto can already do the second. Should Nikto do the first? I certainly

don't use it like this, but is this how other people use it?

Finally reporting is now done on the fly, so items are written to the  
report as they're found. This means that you can now CTRL+C in the
of a scan and not lose your results (this is a big positive for me).  
Though, it will not write host and file closing statements on HTML or


Nikto-discuss mailing list
Nikto-discuss at attrition.org

More information about the Nikto-discuss mailing list