1. bt nikto # ./nikto.pl -h www.skilled.com.au
  2. ---------------------------------------------------------------------------
  3. - Nikto 2.01/2.01 - cirt.net
  4. + Target IP: 144.140.33.197
  5. + Target Hostname: www.skilled.com.au
  6. + Target Port: 80
  7. + Start Time: 2008-03-17 21:14:09
  8. ---------------------------------------------------------------------------
  9. + Server: Microsoft-IIS/5.0
  10. - Retrieved X-Powered-By header: ASP.NET
  11. + Allowed HTTP Methods: OPTIONS, TRACE, GET, HEAD
  12. + OSVDB-877: HTTP method ('Allow' Header): 'TRACE' is typically only used for debugging and sho
  13. uld be disabled. This message does not mean it is vulnerable to XST.
  14. + Public HTTP Methods: OPTIONS, TRACE, GET, HEAD, POST
  15. + OSVDB-877: HTTP method ('Public' Header): 'TRACE' is typically only used for debugging and sh
  16. ould be disabled. This message does not mean it is vulnerable to XST.
  17. + Microsoft-IIS/5.0 appears to be outdated (4.0 for NT 4, 5.0 for Win2k)
  18. + OSVDB-0: GET /servlet/com.unify.servletexec.UploadServlet : This servlet allows attackers to
  19. upload files to the server.
  20. + OSVDB-0: GET /servlet/com.livesoftware.jrun.plugins.ssi.SSIFilter : Allaire Coldfusion allows
  21. jsp source viewed through a vulnerable SSI call.
  22. + OSVDB-0: GET /servlet/SchedulerTransfer : PeopleSoft SchedulerTransfer servlet found, which m
  23. ay allow remote command execution. See http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp
  24. ?oid=21999
  25. + OSVDB-0: GET /servlet/sunexamples.BBoardServlet : This default servlet lets attackers execute
  26. arbitrary commands.
  27. + OSVDB-0: GET /junk.aspx : ASP.net reveals its version in invalid .aspx error messages.
  28. + OSVDB-0: GET /servlet/SessionManager : IBM WebSphere reconfigure servlet (user=servlet, password=mana
  29. ger). All default code should be removed from servers.
  30. + OSVDB-0: GET /servlet/allaire.jrun.ssi.SSIFilter : Allaire Coldfusion allows jsp source viewed throug
  31. h a vulnerable SSI call, see MPSB01-12 http://www.macromedia.com/devnet/security/security_zone/mpsb01-1
  32. 2.html.
  33. + OSVDB-3092: GET /_vti_pvt/deptodoc.btr : FrontPage file found. This may contain useful information.
  34. + OSVDB-3092: GET /_vti_pvt/doctodep.btr : FrontPage file found. This may contain useful information.
  35. + OSVDB-473: GET /_vti_pvt/access.cnf : Contains HTTP server-specific access control information, remov
  36. e or ACL if FrontPage is not being used.
  37. + OSVDB-473: GET /_vti_pvt/service.cnf : Contains meta-information about the web server, remove or ACL
  38. if FrontPage is not being used.
  39. + OSVDB-473: GET /_vti_pvt/services.cnf : Contains the list of subwebs, remove or ACL if FrontPage is n
  40. ot being used. May reveal server version if Admin has changed it.
  41. + OSVDB-473: GET /_vti_pvt/linkinfo.cnf : IIS file shows http links on and off site. Might show host tr
  42. ust relationships and other machines on network.
  43. + OSVDB-877: TRACK / : TRACK option ('TRACE' alias) appears to allow XSS or credential theft. See http:
  44. //www.cgisecurity.com/whitehat-mirror/WhitePaper_screen.pdf for details
  45. + OSVDB-877: TRACE / : TRACE option appears to allow XSS or credential theft. See http://www.cgisecurit
  46. y.com/whitehat-mirror/WhitePaper_screen.pdf for details
  47. + OSVDB-3233: GET /servlet/Counter : JRun default servlet found. All default code should be removed fro
  48. m servers.
  49. + OSVDB-3233: GET /servlet/DateServlet : JRun default servlet found. All default code should be removed
  50. from servers.
  51. + OSVDB-3233: GET /servlet/FingerServlet : JRun default servlet found. All default code should be remov ed from servers.
  52. + OSVDB-3233: GET /servlet/HelloWorldServlet : JRun default servlet found. All default code should be r emoved from servers.
  53. + OSVDB-3233: GET /servlet/SessionServlet : JRun or Netware WebSphere default servlet found. All defaul t code should be removed from servers.
  54. + OSVDB-3233: GET /servlet/SimpleServlet : JRun default servlet found (possibly Websphere). All default code should be removed from servers.
  55. + OSVDB-3233: GET /servlet/SnoopServlet : JRun, Netware Java Servlet Gateway, or WebSphere default serv let found. All default code should be removed from servers.
  56. + OSVDB-3233: GET /servlet/AdminServlet : Netware Web Search Server (adminservlet) found. All default c ode should be removed from web servers.
  57. + OSVDB-3233: GET /servlet/gwmonitor : Netware Gateway monitor found. All default code should be remove d from web servers.
  58. + OSVDB-3233: GET /servlet/PrintServlet : Novell Netware default servlet found. All default code should be removed from the system.
  59. + OSVDB-3233: GET /servlet/SearchServlet : Novell Netware default servlet found. All default code shoul d be removed from the system.
  60. + OSVDB-3233: GET /servlet/ServletManager : Netware Java Servlet Gateway found. Default user id is serv let, default password is manager. All default code should be removed from Internet servers.
  61. + OSVDB-3233: GET /servlet/sq1cdsn : Novell Netware default servlet found. All default code should be r emoved from the system.
  62. + OSVDB-3233: GET /servlet/sqlcdsn : Netware SQL connector found. All default code should be removed fr om web servers.
  63. + OSVDB-3233: GET /servlet/webacc : Netware Enterprise and/or GroupWise web access found. All default c ode should be removed from Internet servers.
  64. + OSVDB-3233: GET /servlet/webpub : Netware Web Publisher found. All default code should be removed fro m web servers.
  65. + OSVDB-3233: GET /OA_HTML/jsp/fnd/fndhelp.jsp?dbc=/u01/oracle/prodappl/fnd/11.5.0/secure/dbprod2_prod.dbc : Oracle Applications help page found.
  66. + 4343 items checked: 38 item(s) reported on remote host
  67. + End Time: 2008-03-17 21:28:52 (883 seconds)
  68. ---------------------------------------------------------------------------
  69. + 1 host(s) tested
  70.