0% found this document useful (0 votes)
10 views5 pages

NMAP and NIKTO

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 5

NMAP and NIKTO

Nmap (Network Mapper)

 Definition and Purpose


Nmap (Network Mapper) is an open-source tool
used for network scanning and vulnerability
assessment. It identifies live hosts, open ports,
services, and operating systems, making it a
cornerstone of network security evaluations.

 Key Features

 Host Discovery:

o Determines which devices are live and connected to a network.


Example: Scanning a corporate network to locate unauthorized devices.
 Port Scanning:

o Identifies open ports and their associated services.


Example: Detecting an open port 80 to determine if a web server is running
and if it’s vulnerable.
 Service and Version Detection:

o Reveals details about the software running on open ports, including version
numbers.
Example: Identifying Apache 2.4.41 on a web server and checking it against
known vulnerabilities.

 Operating System Detection:

o Estimates the operating system of a device based on response patterns.


Example: Recognizing an outdated Windows 7 system vulnerable to
EternalBlue.
 Nmap Scripting Engine (NSE):

o Automates vulnerability detection and exploits using a library of pre-built


scripts
Example: A script to detect misconfigured SMB shares in a network.

 Real-World Applications

o During a ransomware outbreak, Nmap is used to scan for suspicious open ports to
identify compromised devices.

 Infrastructure Hardening:

o A company uses Nmap to map its network and close unused ports, reducing
its attack surface.

 IoT Security:

o Researchers use Nmap to audit IoT devices in smart homes, discovering


vulnerabilities like default passwords.

 Conclusion

o Nmap is a powerful tool for network analysis, offering comprehensive


scanning capabilities that make it indispensable for both offensive and
defensive cybersecurity operations.
Nikto

o Definition and Purpose

Nikto is an open-source web server scanner


designed to detect vulnerabilities,
misconfigurations, and outdated components in
web servers and applications. It’s a vital tool for
ensuring web application security.

 Key Features

 Comprehensive Vulnerability Scanning:

o Scans for over 6,700 known vulnerabilities, including outdated software and
misconfigurations.
Example: Detecting an outdated PHP version susceptible to code injection
attacks.

 HTTP Header Analysis:

o Examines HTTP headers to identify weaknesses like missing security headers or


dangerous configurations.
Example: Flagging a missing X-Frame-Options header, which could enable
clickjacking.

 Detection of Dangerous HTTP Methods:

o Identifies methods like PUT and DELETE that could allow unauthorized actions.
Example: Detecting enabled TRACE methods, which can lead to cross-site tracing
attacks.

 SSL/TLS Security Analysis:


o Evaluates SSL/TLS implementations for vulnerabilities like weak ciphers or
expired certificates.
Example: Highlighting support for insecure SSLv3, which is susceptible to the
POODLE attack.

 Real-World Applications

 Web Server Security Audits:

o A university uses Nikto to assess its public-facing web servers, identifying


misconfigured HTTP headers and outdated software.

 Compliance Testing:

o Organizations use Nikto to ensure their web servers comply with standards like
PCI DSS, avoiding fines and protecting customer data.

 Bug Bounty Programs:

o Ethical hackers leverage Nikto to identify vulnerabilities in web applications,


earning rewards for responsible disclosure.
 Conclusion

o Nikto is an efficient tool for web server vulnerability detection. Its simplicity and
comprehensive checks make it indispensable for organizations seeking to secure
their web applications against common threats.
 Bibliography

1. "Nmap Official Documentation" - https://nmap.org


2. "Nikto GitHub Repository" - https://github.com/sullo/nikto
3. "OWASP Nikto Project" - https://owasp.org
4. "Security Tools Overview" -
https://securitytrails.com/blog/penetration-testing-tools
5. "Practical Nmap Scanning Examples" - https://null-
byte.wonderhowto.com

You might also like