[Nikto-discuss] Recent changes in trunk
David Klein
davidkl at ivision.com.au
Sun Aug 2 22:30:17 UTC 2009
Hi David,
I agree, if a system has Nikto installed it will most likely have access
to NMAP as well.
Personally I have never used Nikto to target more than one specific port
at a time, I guess it's a paranoia thing..
Regards,
David Klein
-----Original Message-----
From: nikto-discuss-bounces at attrition.org
[mailto:nikto-discuss-bounces at attrition.org] On Behalf Of David Lodge
Sent: Saturday, August 01, 2009 9:38 PM
To: nikto-discuss at attrition.org
Subject: [Nikto-discuss] Recent changes in trunk
To fix the reporting bug I created earlier that was found by Jabra, I've
made some massive changes to the way Nikto handles targets and
reporting,
a quick synopsis is below:
* Nikto will now work out and assign "marks" (the variable target had
already been used :-) before it starts scanning
* Nikto will call reporter plugins for each item found
* Nikto will no longer use nmap to portscan ports
How you will see this when running nikto is that, the inputs to -host
and
-port have been changed. You used to be able to supply:
nikto.pl -host <file>
nikto.pl -host <url>
nikto.pl -host "hostname1 hostname2" -port 80-81
This now looks like:
nikto.pl -host hostname1,file,url -port port1,port2
Where the host list can be any number of hosts, urls or files containing
hosts or urls. If ports are supplied they are applied to all hosts/urls
which don't already have ports.
For example if we have the files host1.txt containing:
http://fred/
jim:8081
And host2.txt containing:
http://shelia:89/
Then we can do:
nikto.pl -host host1.txt,host2.txt,arabella -port 80,443
This will set the marks as:
http://fred:80
https://fred:443
http://jim:8081
http://shelia:89
http://arabella:80
https://arabella:443
I ended up removing nmap from the code, as this was only use in certain
cases to do a prelude to a test that Nikto would do anyway. This removes
some functionality that would allow Nikto to do a portscan. In my
opinion,
Nikto shouldn't be doing portscans, nmap (or your favourite portscanner)
can do a much better job than Nikto can do and I'd rather take a feed
from
nmap, rather than have Nikto spawn nmap, so instead of doing:
nikto.pl -host 192.168.0.0/24 -port 80,443,8000-9000
We should do:
nmap -p80,443,8000-9000 192.168.0.0/24 -oG - | nikto.pl -host -
Nikto can already do the second. Should Nikto do the first? I certainly
don't use it like this, but is this how other people use it?
Finally reporting is now done on the fly, so items are written to the
report as they're found. This means that you can now CTRL+C in the
middle
of a scan and not lose your results (this is a big positive for me).
Though, it will not write host and file closing statements on HTML or
XML
types.
Comments/opinions?
dave
_______________________________________________
Nikto-discuss mailing list
Nikto-discuss at attrition.org
https://attrition.org/mailman/listinfo/nikto-discuss
More information about the Nikto-discuss
mailing list