Hari,

Sorry this is a little off track, although it shows you are not the only
one that is not having much luck with Nikto...

As you say Nessus runs Nikto by default if Nikto is in the path. That
caught me my surprise, I installed Nikto to take a look at it and next
thing Nessus is running it; in my view that's not a good default
setting. I think removing Nikto from the path should stop it from
running. 

Unfortunately Nikto does not fit in with the Nessus way of doing things.
I think the Nikto plug-in only ever generates reports classed as
"information". Having looked at some Nikto output, that's understandable
because it seems impossible to automatically estimate what risk rating
to give to a Nikto report. The documentation about how to interpret
Nikto reports is sketchy as far as I can tell. The Nikto reports, at
least the ones generated via the Nessus plug-in, tend to be very verbose
and long for all but the smallest Web sites. Nikto seems to list
everything it can see, says that more or less everything could be
vulnerable (often without being specific) then leaves you to
investigate. Nikto is, however, reportedly one of the best tools for
testing Web servers...

Example Nikto report:

- Nikto 1.34/1.31 - www.cirt.net + Target IP: xxx.xxx.xxx.xxx + Target
Hostname: xxxxxx + Target Port: 80 + Start Time: Sat Feb 17 00:33:53
2007
------------------------------------------------------------------------
--- - Scan is dependent on "Server" string which can be faked, use -g to
override + Server: Microsoft-IIS/6.0 + No CGI Directories found (use '-C
all' to force check all possible dirs) - Retrieved X-Powered-By header:
ASP.NET + IIS may reveal its internal IP in the Content-Location header.
The value is "http://xxx.xxx.xxx.xxx/Default.htm";. CAN-2000-0649. +
Allowed HTTP Methods: OPTIONS, TRACE, GET, HEAD, COPY, PROPFIND, SEARCH,
LOCK, UNLOCK + HTTP method 'PROPFIND' may indicate DAV/WebDAV is
installed. This may be used to get directory listings if indexing is
allowed but a default page exists. + HTTP method 'SEARCH' may be used to
get directory listings if Index Server is running. + HTTP method 'TRACE'
is typically only used for debugging. It should be disabled. +
Microsoft-IIS/6.0 appears to be outdated (4.0 for NT 4, 5.0 for Win2k) +
/modules.php?name=Members_List&letter=All&sortby=pass - PHP Nuke module
allows user names and passwords to be viewed. See
http://www.frog-man.org/tutos/PHP-Nuke6.0-Members_List-Your_Account.txt
for other SQL exploits in this module. (GET) +
/Sites/Knowledge/Membership/Inspired/ViewCode.asp - The default
ViewCode.asp can allow an attacker to read any file on the machine.
CAN-1999-0738. MS99-013. (GET) +
/Sites/Knowledge/Membership/Inspiredtutorial/ViewCode.asp - The default
ViewCode.asp can allow an attacker to read any file on the machine.
CAN-1999-0738. MS99-013. (GET) +
/Sites/Samples/Knowledge/Membership/Inspired/ViewCode.asp - The default
ViewCode.asp can allow an attacker to read any file on the machine.
CAN-1999-0738. MS99-013. (GET) +
/Sites/Samples/Knowledge/Membership/Inspiredtutorial/ViewCode.asp - The
default ViewCode.asp can allow an attacker to read any file on the
machine. CAN-1999-0738. MS99-013. (GET) +
/Sites/Samples/Knowledge/Push/ViewCode.asp - The default ViewCode.asp
can allow an attacker to read any file on the machine. CAN-1999-0738.
MS99-013. (GET) + /Sites/Samples/Knowledge/Search/ViewCode.asp - The
default ViewCode.asp can allow an attacker to read any file on the
machine. CAN-1999-0738. MS99-013. (GET) +
/_vti_bin/shtml.dll/_vti_rpc?method=server+version%3a4%2e0%2e2%2e2611 -
Gives info about server settings. CAN-2000-0413, CAN-2000-0709,
CAN-2000-0710, BID-1608, BID-1174. (POST) +
/_vti_bin/_vti_aut/author.dll?method=list+documents%3a3%2e0%2e2%2e1706&s
ervice%5fname=&listHiddenDocs=true&listExplorerDocs=true&listRecurse=fal
se&listFiles=true&listFolders=true&listLinkInfo=true&listIncludeParent=t
rue&listDerivedT=false&listBorders=false - We seem to have authoring
access to the FrontPage web. (POST) + /_vti_inf.html - FrontPage may be
installed. (GET) + /_vti_pvt/service.cnf - Contains meta-information
about the web server, remove or ACL if FrontPage is not being used.
(GET) + /_vti_pvt/services.cnf - Contains the list of subwebs, remove or
ACL if FrontPage is not being used. May reveal server version if Admin
has changed it. (GET) + 2034 items checked - 12 item(s) found on remote
host(s) + End Time: Sat Feb 17 00:34:10 2007 (17 seconds)
------------------------------------------------------------------------
--- + 1 host(s) tested

--
Carl Nelson
Distributed Systems Support Section, Computer Centre, University of
Leicester, Leicester, LE1 7RH, U.K.
Tel: +44 (0)116 252 2060, Fax: +44 (0)116 252 5027 

> -----Original Message-----
> From: [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED] On Behalf Of Hari Sekhon
> Sent: 01 March 2007 10:35
> To: [email protected]
> Subject: Re: NonExistant Hosts Appear when using Nikto within Nessus
> 
> Does nobody know anything about this?
> 
> It completely ruins any network reports if you have nikto with nessus.
> 
> Do I have to remove Nikto from the path just to get around 
> this behaviour?
> 
> 
> 
> On 20/02/07, Hari Sekhon <[EMAIL PROTECTED]> wrote:
> > Hi,
> >    when using Nessus to scan a my network with the Nikto 
> nasl wrapper 
> > (which must be activated automatically by nessus since I have Nikto
> > installed) it gives a report which shows a host on every single ip 
> > address, even though nearly all of them are unused ips. Each "host" 
> > then has one security note
> >
> > http (80/tcp)
> >
> > Here is the Nikto report:
> > 
> --------------------------------------------------------------
> -------------
> > - Nikto 1.32/1.19     -     www.cirt.net
> > + No HTTP(s) ports found on x.x.x.x / 80
> > + 1 host(s) tested
> >
> >
> > This means that I have a report with tonnes of fluff and if I then 
> > want to generate a html with pie charts (cos I like pictures and 
> > pretty
> > colours) the charts will be very inaccurate since the percentage 
> > warnings will be completely off and make it look like any 
> problem is a 
> > very tiny percentage.
> >
> > Is there any way that I can stop it considering all these hosts up 
> > when in fact there is nothing listening on the ips.
> >
> > Thanks
> >
> > Hari Sekhon
> >
> 
> 
> --
> Hari Sekhon
> _______________________________________________
> Nessus mailing list
> [email protected]
> http://mail.nessus.org/mailman/listinfo/nessus
> 
_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to