Nikto
What is Nikto?
Nikto is a free software command-line vulnerability scanner that scans webservers for dangerous files/CGIs, outdated server software and other problems. It performs generic and server type specific checks. It also captures and prints any cookies received. To learn more about the Nikto scanner itself visit cirt.net or Nikto GitHub.
Deployment
The nikto chart can be deployed via helm:
# Install HelmChart (use -n to configure another namespace)
helm upgrade --install nikto oci://ghcr.io/securecodebox/helm/nikto
Scanner Configuration
The following security scan configuration example are based on the Nikto Documentation, please take a look at the original documentation for more configuration examples.
- The most basic Nikto scan requires simply a host to target, since port 80 is assumed if none is specified. The host can either be an IP or a hostname of a machine, and is specified using the -h (-host) option. This will scan the IP 192.168.0.1 on TCP port 80:
-h 192.168.0.1
- To check on a different port, specify the port number with the -p (-port) option. This will scan the IP 192.168.0.1 on TCP port 443:
-h 192.168.0.1 -p 443
- Hosts, ports and protocols may also be specified by using a full URL syntax, and it will be scanned:
-h https://192.168.0.1:443/
- Nikto can scan multiple ports in the same scanning session. To test more than one port on the same host, specify the list of ports in the -p (-port) option. Ports can be specified as a range (i.e., 80-90), or as a comma-delimited list, (i.e., 80,88,90). This will scan the host on ports 80, 88 and 443:
-h 192.168.0.1 -p 80,88,443
Nikto also has a comprehensive list of command line options documented which maybe useful to use.
- Scan tuning can be used to decrease the number of tests performed against a target. By specifying the type of test to include or exclude, faster, focused testing can be completed. This is useful in situations where the presence of certain file types are undesired -- such as XSS or simply "interesting" files. Test types can be controlled at an individual level by specifying their identifier to the -T (-Tuning) option. In the default mode, if -T is invoked only the test type(s) specified will be executed. For example, only the tests for "Remote file retrieval" and "Command execution" can be performed against the target:
192.168.0.1 -T 58
- 0 - File Upload. Exploits which allow a file to be uploaded to the target server.
- 1 - Interesting File / Seen in logs. An unknown but suspicious file or attack that has been seen in web server logs (note: if you have information regarding any of these attacks, please contact CIRT, Inc.).
- 2 - Misconfiguration / Default File. Default files or files which have been misconfigured in some manner. This could be documentation, or a resource which should be password protected.
- 3 - Information Disclosure. A resource which reveals information about the target. This could be a file system path or account name.
- 4 - Injection (XSS/Script/HTML). Any manner of injection, including cross site scripting (XSS) or content (HTML). This does not include command injection.
- 5 - Remote File Retrieval - Inside Web Root. Resource allows remote users to retrieve unauthorized files from within the web server's root directory.
- 6 - Denial of Service. Resource allows a denial of service against the target application, web server or host (note: no intentional DoS attacks are attempted).
- 7 - Remote File Retrieval - Server Wide. Resource allows remote users to retrieve unauthorized files from anywhere on the target.
- 8 - Command Execution / Remote Shell. Resource allows the user to execute a system command or spawn a remote shell.
- 9 - SQL Injection. Any type of attack which allows SQL to be executed against a database.
- a - Authentication Bypass. Allows client to access a resource it should not be allowed to access.
- b - Software Identification. Installed software or program could be positively identified.
- c - Remote source inclusion. Software allows remote inclusion of source code.
- x - Reverse Tuning Options. Perform exclusion of the specified tuning type instead of inclusion of the specified tuning type
Requirements
Kubernetes: >=v1.11.0-0
Values
Key | Type | Default | Description |
---|---|---|---|
cascadingRules.enabled | bool | false | Enables or disables the installation of the default cascading rules for this scanner |
imagePullSecrets | list | [] | Define imagePullSecrets when a private registry is used (see: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/) |
parser.affinity | object | {} | Optional affinity settings that control how the parser job is scheduled (see: https://kubernetes.io/docs/tasks/configure-pod-container/assign-pods-nodes-using-node-affinity/) |
parser.env | list | [] | Optional environment variables mapped into each parseJob (see: https://kubernetes.io/docs/tasks/inject-data-application/define-environment-variable-container/) |
parser.image.pullPolicy | string | "IfNotPresent" | Image pull policy. One of Always, Never, IfNotPresent. Defaults to Always if :latest tag is specified, or IfNotPresent otherwise. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images |
parser.image.repository | string | "docker.io/securecodebox/parser-nikto" | Parser image repository |
parser.image.tag | string | defaults to the charts version | Parser image tag |
parser.nodeSelector | object | {} | Optional nodeSelector settings that control how the scanner job is scheduled (see: https://kubernetes.io/docs/tasks/configure-pod-container/assign-pods-nodes/) |
parser.resources | object | { requests: { cpu: "200m", memory: "100Mi" }, limits: { cpu: "400m", memory: "200Mi" } } | Optional resources lets you control resource limits and requests for the parser container. See https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/ |
parser.scopeLimiterAliases | object | {} | Optional finding aliases to be used in the scopeLimiter. |
parser.tolerations | list | [] | Optional tolerations settings that control how the parser job is scheduled (see: https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) |
parser.ttlSecondsAfterFinished | string | nil | seconds after which the Kubernetes job for the parser will be deleted. Requires the Kubernetes TTLAfterFinished controller: https://kubernetes.io/docs/concepts/workloads/controllers/ttlafterfinished/ |
scanner.activeDeadlineSeconds | string | nil | There are situations where you want to fail a scan Job after some amount of time. To do so, set activeDeadlineSeconds to define an active deadline (in seconds) when considering a scan Job as failed. (see: https://kubernetes.io/docs/concepts/workloads/controllers/job/#job-termination-and-cleanup) |
scanner.affinity | object | {} | Optional affinity settings that control how the scanner job is scheduled (see: https://kubernetes.io/docs/tasks/configure-pod-container/assign-pods-nodes-using-node-affinity/) |
scanner.backoffLimit | int | 3 | There are situations where you want to fail a scan Job after some amount of retries due to a logical error in configuration etc. To do so, set backoffLimit to specify the number of retries before considering a scan Job as failed. (see: https://kubernetes.io/docs/concepts/workloads/controllers/job/#pod-backoff-failure-policy) |
scanner.env | list | [] | Optional environment variables mapped into each scanJob (see: https://kubernetes.io/docs/tasks/inject-data-application/define-environment-variable-container/) |
scanner.extraContainers | list | [] | Optional additional Containers started with each scanJob (see: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/) |
scanner.extraVolumeMounts | list | [] | Optional VolumeMounts mapped into each scanJob (see: https://kubernetes.io/docs/concepts/storage/volumes/) |
scanner.extraVolumes | list | [] | Optional Volumes mapped into each scanJob (see: https://kubernetes.io/docs/concepts/storage/volumes/) |
scanner.image.pullPolicy | string | "IfNotPresent" | Image pull policy. One of Always, Never, IfNotPresent. Defaults to Always if :latest tag is specified, or IfNotPresent otherwise. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images |
scanner.image.repository | string | "docker.io/securecodebox/scanner-nikto" | Container Image to run the scan |
scanner.image.tag | string | nil | defaults to the charts appVersion |
scanner.nameAppend | string | nil | append a string to the default scantype name. |
scanner.nodeSelector | object | {} | Optional nodeSelector settings that control how the scanner job is scheduled (see: https://kubernetes.io/docs/tasks/configure-pod-container/assign-pods-nodes/) |
scanner.podSecurityContext | object | {} | Optional securityContext set on scanner pod (see: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/) |
scanner.resources | object | {} | CPU/memory resource requests/limits (see: https://kubernetes.io/docs/tasks/configure-pod-container/assign-memory-resource/, https://kubernetes.io/docs/tasks/configure-pod-container/assign-cpu-resource/) |
scanner.securityContext | object | {"allowPrivilegeEscalation":false,"capabilities":{"drop":["all"]},"privileged":false,"readOnlyRootFilesystem":true,"runAsNonRoot":true} | Optional securityContext set on scanner container (see: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/) |
scanner.securityContext.allowPrivilegeEscalation | bool | false | Ensure that users privileges cannot be escalated |
scanner.securityContext.capabilities.drop[0] | string | "all" | This drops all linux privileges from the container. |
scanner.securityContext.privileged | bool | false | Ensures that the scanner container is not run in privileged mode |
scanner.securityContext.readOnlyRootFilesystem | bool | true | Prevents write access to the containers file system |
scanner.securityContext.runAsNonRoot | bool | true | Enforces that the scanner image is run as a non root user |
scanner.suspend | bool | false | if set to true the scan job will be suspended after creation. You can then resume the job using kubectl resume <jobname> or using a job scheduler like kueue |
scanner.tolerations | list | [] | Optional tolerations settings that control how the scanner job is scheduled (see: https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) |
scanner.ttlSecondsAfterFinished | string | nil | seconds after which the Kubernetes job for the scanner will be deleted. Requires the Kubernetes TTLAfterFinished controller: https://kubernetes.io/docs/concepts/workloads/controllers/ttlafterfinished/ |
License
Code of secureCodeBox is licensed under the Apache License 2.0.
CPU architectures
The scanner is currently supported for these CPU architectures:
- linux/amd64
Examples
demo-bodgeit
In this example, we execute an nikto scan against the intentionally vulnerable bodgeit
Initialize bodgeit in cluster
Before executing the scan, make sure to setup bodgeit
helm upgrade --install bodgeit oci://ghcr.io/securecodebox/helm/bodgeit --wait
- Scan
- Findings
# SPDX-FileCopyrightText: the secureCodeBox authors
#
# SPDX-License-Identifier: Apache-2.0
apiVersion: "execution.securecodebox.io/v1"
kind: Scan
metadata:
name: "nikto-bodgeit"
labels:
organization: "secureCodeBox"
spec:
scanType: "nikto"
parameters:
- "-h"
- "bodgeit"
- "-port 8080"
- "-Tuning"
# Only enable fast (ish) Scan Options, remove attack option like SQLi and RCE. We will leave those to ZAP
- "1,2,3,5,7,b"
# SPDX-FileCopyrightText: the secureCodeBox authors
#
# SPDX-License-Identifier: Apache-2.0
[{
"name": "/: The anti-clickjacking X-Frame-Options header is not present.",
"description": null,
"category": "X-Frame-Options Header",
"location": "http://bodgeit",
"osi_layer": "NETWORK",
"severity": "LOW",
"attributes": {
"ip_addresses": ["10.96.235.197"],
"hostname": "bodgeit",
"banner": "",
"method": "GET",
"port": 8080,
"niktoId": 999957,
"references": [{
"type": "URL",
"value": "https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options"
}]
},
"id": "6be1c099-35e1-44b3-a492-a718b433bbaf",
"parsed_at": "2023-08-22T13:18:46.280Z"
}, {
"name": "/: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type.",
"description": null,
"category": "X-Content-Type-Options Header",
"location": "http://bodgeit",
"osi_layer": "NETWORK",
"severity": "INFORMATIONAL",
"attributes": {
"ip_addresses": ["10.96.235.197"],
"hostname": "bodgeit",
"banner": "",
"method": "GET",
"port": 8080,
"niktoId": 999103,
"references": [{
"type": "URL",
"value": "https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/"
}]
},
"id": "e8f6fe9a-9ec1-46ff-a0b3-f9150dae70a4",
"parsed_at": "2023-08-22T13:18:46.280Z"
}, {
"name": "/favicon.ico: identifies this app/server as: Apache Tomcat (possibly 5.5.26 through 8.0.15), Alfresco Community.",
"description": null,
"category": "Identified Software",
"location": "http://bodgeit",
"osi_layer": "NETWORK",
"severity": "INFORMATIONAL",
"attributes": {
"ip_addresses": ["10.96.235.197"],
"hostname": "bodgeit",
"banner": "",
"method": "GET",
"port": 8080,
"niktoId": 500645,
"references": [{
"type": "URL",
"value": "https://en.wikipedia.org/wiki/Favicon"
}]
},
"id": "7fd8b1d6-c783-48a7-98a1-d4bd100badef",
"parsed_at": "2023-08-22T13:18:46.280Z"
}, {
"name": "OPTIONS: Allowed HTTP Methods: GET, HEAD, POST, PUT, DELETE, OPTIONS .",
"description": null,
"category": "Nikto Finding",
"location": "http://bodgeit",
"osi_layer": "NETWORK",
"severity": "INFORMATIONAL",
"attributes": {
"ip_addresses": ["10.96.235.197"],
"hostname": "bodgeit",
"banner": "",
"method": "OPTIONS",
"port": 8080,
"niktoId": 999990,
"references": null
},
"id": "60d87413-9abc-4ce2-b0e2-6e898b7a3dc6",
"parsed_at": "2023-08-22T13:18:46.280Z"
}, {
"name": "HTTP method ('Allow' Header): 'PUT' method could allow clients to save files on the web server.",
"description": null,
"category": "Nikto Finding",
"location": "http://bodgeit",
"osi_layer": "NETWORK",
"severity": "INFORMATIONAL",
"attributes": {
"ip_addresses": ["10.96.235.197"],
"hostname": "bodgeit",
"banner": "",
"method": "GET",
"port": 8080,
"niktoId": 400001,
"references": null
},
"id": "4d2f499d-e475-417c-8d17-12e2a993e2c9",
"parsed_at": "2023-08-22T13:18:46.280Z"
}, {
"name": "HTTP method ('Allow' Header): 'DELETE' may allow clients to remove files on the web server.",
"description": null,
"category": "Nikto Finding",
"location": "http://bodgeit",
"osi_layer": "NETWORK",
"severity": "INFORMATIONAL",
"attributes": {
"ip_addresses": ["10.96.235.197"],
"hostname": "bodgeit",
"banner": "",
"method": "GET",
"port": 8080,
"niktoId": 400000,
"references": null
},
"id": "a2862265-8ae0-4f1f-8333-8b7d30439db2",
"parsed_at": "2023-08-22T13:18:46.280Z"
}, {
"name": "/examples/servlets/index.html: Apache Tomcat default JSP pages present.",
"description": null,
"category": "Potential Vulnerability",
"location": "http://bodgeit",
"osi_layer": "NETWORK",
"severity": "HIGH",
"attributes": {
"ip_addresses": ["10.96.235.197"],
"hostname": "bodgeit",
"banner": "",
"method": "GET",
"port": 8080,
"niktoId": 366,
"references": null
},
"id": "5f46e9f4-5938-4c19-915c-5fa21e8e3c65",
"parsed_at": "2023-08-22T13:18:46.280Z"
}, {
"name": "/examples/jsp/snp/snoop.jsp: Displays information about page retrievals, including other users.",
"description": null,
"category": "Potential Vulnerability",
"location": "http://bodgeit",
"osi_layer": "NETWORK",
"severity": "HIGH",
"attributes": {
"ip_addresses": ["10.96.235.197"],
"hostname": "bodgeit",
"banner": "",
"method": "GET",
"port": 8080,
"niktoId": 1355,
"references": [{
"type": "URL",
"value": "CVE-2004-2104"
}]
},
"id": "969467d0-9acc-4eb9-89d3-ec8b46382d3f",
"parsed_at": "2023-08-22T13:18:46.280Z"
}, {
"name": "/manager/manager-howto.html: Tomcat documentation found.",
"description": null,
"category": "Potential Vulnerability",
"location": "http://bodgeit",
"osi_layer": "NETWORK",
"severity": "HIGH",
"attributes": {
"ip_addresses": ["10.96.235.197"],
"hostname": "bodgeit",
"banner": "",
"method": "GET",
"port": 8080,
"niktoId": 3399,
"references": [{
"type": "URL",
"value": "CWE-552"
}]
},
"id": "c0e6a10e-3293-4fe1-9bad-1c79398c8628",
"parsed_at": "2023-08-22T13:18:46.280Z"
}, {
"name": "/manager/html: Default Tomcat Manager / Host Manager interface found.",
"description": null,
"category": "Potential Vulnerability",
"location": "http://bodgeit",
"osi_layer": "NETWORK",
"severity": "HIGH",
"attributes": {
"ip_addresses": ["10.96.235.197"],
"hostname": "bodgeit",
"banner": "",
"method": "GET",
"port": 8080,
"niktoId": 6525,
"references": null
},
"id": "57a6c749-aa20-4c01-9ed4-bb7335fc42ea",
"parsed_at": "2023-08-22T13:18:46.280Z"
}, {
"name": "/host-manager/html: Default Tomcat Manager / Host Manager interface found.",
"description": null,
"category": "Potential Vulnerability",
"location": "http://bodgeit",
"osi_layer": "NETWORK",
"severity": "HIGH",
"attributes": {
"ip_addresses": ["10.96.235.197"],
"hostname": "bodgeit",
"banner": "",
"method": "GET",
"port": 8080,
"niktoId": 6525,
"references": null
},
"id": "804e3905-1fde-48e2-986f-71479334386a",
"parsed_at": "2023-08-22T13:18:46.280Z"
}, {
"name": "/manager/status: Default Tomcat Server Status interface found.",
"description": null,
"category": "Potential Vulnerability",
"location": "http://bodgeit",
"osi_layer": "NETWORK",
"severity": "HIGH",
"attributes": {
"ip_addresses": ["10.96.235.197"],
"hostname": "bodgeit",
"banner": "",
"method": "GET",
"port": 8080,
"niktoId": 7015,
"references": null
},
"id": "4e749f1c-2413-4ffd-8ab6-ed5e3220f743",
"parsed_at": "2023-08-22T13:18:46.280Z"
}, {
"name": "/host-manager/status: Default Tomcat Server Status interface found.",
"description": null,
"category": "Potential Vulnerability",
"location": "http://bodgeit",
"osi_layer": "NETWORK",
"severity": "HIGH",
"attributes": {
"ip_addresses": ["10.96.235.197"],
"hostname": "bodgeit",
"banner": "",
"method": "GET",
"port": 8080,
"niktoId": 7015,
"references": null
},
"id": "1ed55f05-5c4a-4a17-92fc-b7471beda8d6",
"parsed_at": "2023-08-22T13:18:46.280Z"
}]
demo-docs.securecodebox.io
- Scan
- Findings
# SPDX-FileCopyrightText: the secureCodeBox authors
#
# SPDX-License-Identifier: Apache-2.0
apiVersion: "execution.securecodebox.io/v1"
kind: Scan
metadata:
name: "nikto-www.securecodebox.io"
labels:
organization: "secureCodeBox"
spec:
scanType: "nikto"
parameters:
- "-h"
- "https://www.securecodebox.io/"
- "-Tuning"
# Only enable fast (ish) Scan Options, remove attack option like SQLi and RCE. We will leave those to ZAP
- "1,2,3,5,7,b"
# SPDX-FileCopyrightText: the secureCodeBox authors
#
# SPDX-License-Identifier: Apache-2.0
[{
"name": "/: The anti-clickjacking X-Frame-Options header is not present.",
"description": null,
"category": "X-Frame-Options Header",
"location": "https://www.securecodebox.io",
"osi_layer": "NETWORK",
"severity": "LOW",
"attributes": {
"ip_addresses": ["35.156.224.161"],
"hostname": "www.securecodebox.io",
"banner": "Netlify",
"method": "GET",
"port": 443,
"niktoId": 999957,
"references": [{
"type": "URL",
"value": "https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options"
}]
},
"id": "8c384048-3ec7-49b1-9c63-7ebbdde9c85d",
"parsed_at": "2023-08-22T13:10:10.973Z"
}, {
"name": "/: Netlify was identified by the x-nf-request-id header.",
"description": null,
"category": "Potential Vulnerability",
"location": "https://www.securecodebox.io",
"osi_layer": "NETWORK",
"severity": "HIGH",
"attributes": {
"ip_addresses": ["35.156.224.161"],
"hostname": "www.securecodebox.io",
"banner": "Netlify",
"method": "GET",
"port": 443,
"niktoId": 287,
"references": [{
"type": "URL",
"value": "https://www.netlify.com/"
}]
},
"id": "1fbc6813-d759-4638-920b-aa15a8eb6fde",
"parsed_at": "2023-08-22T13:10:10.973Z"
}, {
"name": "/: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type.",
"description": null,
"category": "X-Content-Type-Options Header",
"location": "https://www.securecodebox.io",
"osi_layer": "NETWORK",
"severity": "INFORMATIONAL",
"attributes": {
"ip_addresses": ["35.156.224.161"],
"hostname": "www.securecodebox.io",
"banner": "Netlify",
"method": "GET",
"port": 443,
"niktoId": 999103,
"references": [{
"type": "URL",
"value": "https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/"
}]
},
"id": "8ec77676-d748-4ae6-8235-277fc4fe16b6",
"parsed_at": "2023-08-22T13:10:10.973Z"
}, {
"name": "/: Server may leak inodes via ETags, header found with file /, inode: c2c4398b0b111b25f098f1dd6777b2f1, size: ssl, mtime: df.",
"description": null,
"category": "Nikto Finding",
"location": "https://www.securecodebox.io",
"osi_layer": "NETWORK",
"severity": "INFORMATIONAL",
"attributes": {
"ip_addresses": ["35.156.224.161"],
"hostname": "www.securecodebox.io",
"banner": "Netlify",
"method": "GET",
"port": 443,
"niktoId": 999984,
"references": [{
"type": "URL",
"value": "CVE-2003-1418"
}]
},
"id": "b6f61215-02e9-416f-b604-1af6c5473a5a",
"parsed_at": "2023-08-22T13:10:10.973Z"
}, {
"name": "/: The Content-Encoding header is set to \"deflate\" which may mean that the server is vulnerable to the BREACH attack.",
"description": null,
"category": "Nikto Finding",
"location": "https://www.securecodebox.io",
"osi_layer": "NETWORK",
"severity": "INFORMATIONAL",
"attributes": {
"ip_addresses": ["35.156.224.161"],
"hostname": "www.securecodebox.io",
"banner": "Netlify",
"method": "GET",
"port": 443,
"niktoId": 999966,
"references": [{
"type": "URL",
"value": "http://breachattack.com/"
}]
},
"id": "09634c3e-9f14-4841-aa90-073ebf28b55a",
"parsed_at": "2023-08-22T13:10:10.973Z"
}, {
"name": "/sitemap.xml: This gives a nice listing of the site content.",
"description": null,
"category": "Potential Vulnerability",
"location": "https://www.securecodebox.io",
"osi_layer": "NETWORK",
"severity": "HIGH",
"attributes": {
"ip_addresses": ["35.156.224.161"],
"hostname": "www.securecodebox.io",
"banner": "Netlify",
"method": "GET",
"port": 443,
"niktoId": 1218,
"references": null
},
"id": "12b6f643-37d7-45cf-b1ac-7231902a328c",
"parsed_at": "2023-08-22T13:10:10.973Z"
}]
demo-juice-shop
In this example we execute an kubeaudit scan against the intentional vulnerable juice-shop
Initialize juice-shop in cluster
Before executing the scan, make sure to setup juice-shop
helm upgrade --install juice-shop oci://ghcr.io/securecodebox/helm/juice-shop --wait
- Scan
- Findings
# SPDX-FileCopyrightText: the secureCodeBox authors
#
# SPDX-License-Identifier: Apache-2.0
apiVersion: "execution.securecodebox.io/v1"
kind: Scan
metadata:
name: "nikto-juice-shop"
labels:
organization: "secureCodeBox"
spec:
scanType: "nikto"
parameters:
- "-h"
- "juice-shop"
- "-port 3000"
- "-Tuning"
# Only enable fast (ish) Scan Options, remove attack option like SQLi and RCE. We will leave those to ZAP
- "1,2,3,5,7,b"
# SPDX-FileCopyrightText: the secureCodeBox authors
#
# SPDX-License-Identifier: Apache-2.0
[
{
"name": "Retrieved access-control-allow-origin header: *.",
"description": null,
"category": "Nikto Finding",
"location": "http://bodgeit",
"osi_layer": "NETWORK",
"severity": "INFORMATIONAL",
"attributes":
{
"ip_address": "10.96.244.199",
"hostname": "bodgeit",
"banner": "",
"method": "GET",
"port": 3000,
"niktoId": 999986,
},
"id": "ada07ba9-6bb3-4d3f-ad43-a70271364639",
"parsed_at": "2022-01-11T10:18:28.344Z",
},
{
"name": "Entry '/ftp/' in robots.txt returned a non-forbidden or redirect HTTP code (200).",
"description": null,
"category": "Nikto Finding",
"location": "http://bodgeit",
"osi_layer": "NETWORK",
"severity": "INFORMATIONAL",
"attributes":
{
"ip_address": "10.96.244.199",
"hostname": "bodgeit",
"banner": "",
"method": "GET",
"port": 3000,
"niktoId": 999997,
},
"id": "0738d403-5440-4ede-ae36-47ecbf34ad9b",
"parsed_at": "2022-01-11T10:18:28.345Z",
},
{
"name": '"robots.txt" contains 1 entry which should be manually viewed.',
"description": null,
"category": "robots.txt",
"location": "http://bodgeit",
"osi_layer": "NETWORK",
"severity": "INFORMATIONAL",
"attributes":
{
"ip_address": "10.96.244.199",
"hostname": "bodgeit",
"banner": "",
"method": "GET",
"port": 3000,
"niktoId": 999996,
},
"id": "1d4c72c8-337c-47ea-b59f-5231928e1b9c",
"parsed_at": "2022-01-11T10:18:28.345Z",
},
]