NMAP and NIKTO
NMAP and NIKTO
NMAP and NIKTO
Key Features
Host Discovery:
o Reveals details about the software running on open ports, including version
numbers.
Example: Identifying Apache 2.4.41 on a web server and checking it against
known vulnerabilities.
Real-World Applications
o During a ransomware outbreak, Nmap is used to scan for suspicious open ports to
identify compromised devices.
Infrastructure Hardening:
o A company uses Nmap to map its network and close unused ports, reducing
its attack surface.
IoT Security:
Conclusion
Key Features
o Scans for over 6,700 known vulnerabilities, including outdated software and
misconfigurations.
Example: Detecting an outdated PHP version susceptible to code injection
attacks.
o Identifies methods like PUT and DELETE that could allow unauthorized actions.
Example: Detecting enabled TRACE methods, which can lead to cross-site tracing
attacks.
Real-World Applications
Compliance Testing:
o Organizations use Nikto to ensure their web servers comply with standards like
PCI DSS, avoiding fines and protecting customer data.
o Nikto is an efficient tool for web server vulnerability detection. Its simplicity and
comprehensive checks make it indispensable for organizations seeking to secure
their web applications against common threats.
Bibliography