0% found this document useful (0 votes)
204 views3 pages

Nikto Scan Results for Juice Shop

The document reports the results of a scan using the Nikto tool against the target host pip3lee101-juiceshop.herokuapp.com on port 80. It found several potentially interesting archive and certificate files as well as identified some common vulnerabilities and issues such as the lack of an X-XSS-Protection header and entry in the robots.txt that returned a non-forbidden code.

Uploaded by

pip3lee101
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
204 views3 pages

Nikto Scan Results for Juice Shop

The document reports the results of a scan using the Nikto tool against the target host pip3lee101-juiceshop.herokuapp.com on port 80. It found several potentially interesting archive and certificate files as well as identified some common vulnerabilities and issues such as the lack of an X-XSS-Protection header and entry in the robots.txt that returned a non-forbidden code.

Uploaded by

pip3lee101
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd

- Nikto v2.1.6/2.1.

5
+ Target Host: [Link]
+ Target Port: 80
+ GET Retrieved via header: 1.1 vegur
+ GET Retrieved access-control-allow-origin header: *
+ GET The X-XSS-Protection header is not defined. This header can hint to the user
agent to protect against some forms of XSS
+ GET Uncommon header 'feature-policy' found, with contents: payment 'self'
+ GET Uncommon header 'x-recruiting' found, with contents: /#/jobs
+ GET Entry '/ftp/' in [Link] returned a non-forbidden or redirect HTTP code
(503)
+ GET "[Link]" contains 1 entry which should be manually viewed.
+ HEAD /[Link]: Potentially interesting archive/cert
file found.
+ HEAD /[Link].tar: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link].bz2: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert
file found.
+ HEAD /[Link]: Potentially interesting archive/cert
file found.
+ HEAD /pip3lee101-juiceshop_herokuapp_com.tgz: Potentially interesting
archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert
file found.
+ HEAD /[Link]: Potentially interesting
archive/cert file found.
+ HEAD /[Link]: Potentially interesting
archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert
file found.
+ HEAD /[Link]: Potentially interesting archive/cert
file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting
archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /pip3lee101-juiceshop_herokuapp_com.cer: Potentially interesting
archive/cert file found.
+ HEAD /pip3lee101-juiceshop_herokuapp_com.tar.bz2: Potentially interesting
archive/cert file found.
+ HEAD /pip3lee101-juiceshop_herokuapp_com.tar: Potentially interesting
archive/cert file found.
+ HEAD /[Link].alz: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting
archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert
file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /pip3lee101-juiceshop_herokuapp_com.egg: Potentially interesting
archive/cert file found.
+ HEAD /[Link]: Potentially interesting
archive/cert file found.
+ HEAD /[Link].bz2: Potentially interesting archive/cert
file found.
+ HEAD /[Link]: Potentially interesting archive/cert file
found.
+ HEAD /[Link].[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert
file found.
+ HEAD /[Link]: Potentially interesting
archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link].pem: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link].tgz: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting
archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link].bz2: Potentially interesting
archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert
file found.
+ HEAD /[Link]: Potentially interesting
archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert
file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting
archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert
file found.
+ HEAD /pip3lee101-juiceshop_herokuapp_com.alz: Potentially interesting
archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert
file found.
+ HEAD /[Link].bz2: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert
file found.
+ HEAD /[Link]: Potentially interesting archive/cert
file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link].cer: Potentially interesting archive/cert file found.
+ HEAD /[Link].bz2: Potentially interesting
archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert
file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /pip3lee101-juiceshop_herokuapp_com.war: Potentially interesting
archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /pip3lee101-juiceshop_herokuapp_com.[Link]: Potentially interesting
archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert
file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert
file found.
+ HEAD /pip3lee101-juiceshop_herokuapp_com.pem: Potentially interesting
archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert
file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link].bz2: Potentially interesting archive/cert file found.
+ HEAD /pip3lee101-juiceshop_herokuapp_com.jks: Potentially interesting
archive/cert file found.
+ HEAD /[Link].jks: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert
file found.
+ HEAD /[Link].bz2: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert
file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert
file found.
+ HEAD /[Link]: Potentially interesting archive/cert
file found.
+ HEAD /[Link].tar.bz2: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link].egg: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting
archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert
file found.
+ HEAD /[Link].bz2: Potentially interesting
archive/cert file found.
+ HEAD /[Link].war: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ HEAD /[Link].bz2: Potentially interesting archive/cert file
found.
+ HEAD /[Link]: Potentially interesting
archive/cert file found.
+ HEAD /[Link]: Potentially interesting
archive/cert file found.
+ HEAD /[Link]: Potentially interesting archive/cert
file found.
+ HEAD /[Link]: Potentially interesting archive/cert file found.
+ OSVDB-3092: GET /public/: This might be interesting...

Common questions

Powered by AI

Uncommon headers like 'feature-policy', which specifies a 'payment' directive allowing only 'self', limit the use of browser features to trusted origins, thereby enhancing security by reducing the attack surface and preventing unauthorized use of sensitive capabilities by malicious scripts .

The presence of several types of archive and certificate files, such as '.tar', '.tgz', and '.cer', on a web server can imply poor file management and expose sensitive information if accessed by unauthorized users. This can lead to data leaks or aid malicious actors in executing attacks by exploiting the exposed contents .

To handle potentially interesting archive or certificate files found on a web server, one should immediately remove unauthorized or extraneous files, ensure encryption for sensitive data, restrict access permissions, regularly audit file systems, and update configurations to prevent unauthorized exposure .

The multitude of file extensions like '.tar', '.lzma', and '.war' suggests potentially poor configurations, indicating a lack of stringent oversight in file management and exposure of critical server components, impacting both the security and operational integrity of the web environment by risking unauthorized access .

The presence of 'x-recruiting' headers typically serves a non-security function, potentially directing users to job opportunities, yet in terms of security, such headers could inadvertently disclose information about the organization structure or user tracking which could be leveraged in social engineering attacks if mismanaged .

Manual review of 'robots.txt' entries can help identify misconfigured entries that might allow access to sensitive directories, ensuring that only non-sensitive paths are indexed by search engines, thereby preventing leakage of potentially exploitable information to unauthorized individuals .

The absence of an 'X-XSS-Protection' header leaves the application vulnerable to Cross-Site Scripting (XSS) attacks, as this header instructs the browser to enable XSS filtering and block pages containing reflected XSS vulnerabilities, thereby enhancing user protection against certain types of attacks .

Exposure of files with sensitive extensions like '.pem' (certificate files), '.jks' (Java KeyStore), can provide attackers with cryptographic keys or certificates essential for secure communications, enabling them to compromise encrypted traffic, impersonate servers, or decrypt sensitive information if accessed improperly .

A 'GET Entry' in 'robots.txt' returning non-forbidden HTTP codes can indicate vulnerabilities, as it might allow unauthorized access to areas intended to be restricted or provide attackers entry points to probe for vulnerabilities, exploiting them to gain access or gather intelligence on the application architecture .

Examining the contents of a 'robots.txt' file is crucial during a security audit because it can reveal paths intended to be hidden from web crawlers but inadvertently expose directories or files containing sensitive information that could be misused by attackers once discovered .

You might also like