UNDERCODE TESTING
307 subscribers
311 photos
24 videos
173 files
29.4K links
🦑 World first platform which Collect & Analyzes every New hacking method.

+ Free AI Practice.

(New Bug Bounty Methods, Tools Updates, AI & Courses).

Services: Undercode.help/services

youtube.com/undercode

@Undercode_Testing
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 Tool: Nikto - Web Server Scanning

Nikto is a web server scanner that detects security vulnerabilities in web servers, including outdated software, security misconfigurations, and other potential threats.

---

### Basic Usage Command:
nikto -h http://example.com


Explanation:
- nikto: Runs the Nikto tool.
- -h http://example.com: Specifies the target host to scan (http://example.com in this case).

---

### Example: Scanning for Specific Vulnerabilities
nikto -h http://example.com -Tuning 3


Explanation:
- -Tuning 3: Scans for known vulnerabilities (such as file permissions, potential information leaks, etc.).

---

### Example: Output Results to a File
nikto -h http://example.com -o scan_results.txt


Explanation:
- -o scan_results.txt: Saves the scan results to a text file named scan_results.txt.

---

### Example: Scan with Authentication
nikto -h http://example.com -auth "admin:password123"


Explanation:
- -auth "admin:password123": Uses basic HTTP authentication with the provided username and password.

---

### Example: Scan a Specific Port
nikto -h http://example.com -p 8080


Explanation:
- -p 8080: Specifies a custom port (8080) to scan for vulnerabilities.

---

### Important Notes:
1. Nikto is a powerful tool for security researchers and penetration testers.
2. Unauthorized scanning and exploitation of web servers is illegal. Always obtain proper authorization before using Nikto for vulnerability assessments.
Forwarded from Exploiting Crew (Pr1vAt3)
10. Wireshark for Security Professionals.pdf
12.7 MB
Forwarded from Exploiting Crew (Pr1vAt3)
100 Web PenTesting checklist_💪🚨.pdf
2.4 MB
Forwarded from Exploiting Crew (Pr1vAt3)
1400- HackerOne Reports.pdf
671.2 KB
Forwarded from Exploiting Crew (Pr1vAt3)
Advance XSS.pdf
370.6 KB
Forwarded from Exploiting Crew (Pr1vAt3)
Advanced Windows Post-Exploitation.pdf
3.6 MB
Forwarded from Exploiting Crew (Pr1vAt3)
Android Hacker's Handbook.pdf
3.9 MB
Forwarded from Exploiting Crew (Pr1vAt3)
API Recon .pdf
2.3 MB
Forwarded from Exploiting Crew (Pr1vAt3)
Awesome Bugbounty Writeups.pdf
220.6 KB
Forwarded from Exploiting Crew (Pr1vAt3)
AWS Cloud Pentest Guide .pdf
294.6 KB
Forwarded from Exploiting Crew (Pr1vAt3)
Azure DevOps Security Checklist.pdf
452.5 KB
Forwarded from Exploiting Crew (Pr1vAt3)
Blue Team Tools.pdf
9.1 MB
Forwarded from Exploiting Crew (Pr1vAt3)
Bug Bounty Bootcamp.pdf
3.2 MB
Forwarded from Exploiting Crew (Pr1vAt3)
Bug Bounty Hunting Essentials.pdf
8.1 MB
Forwarded from Exploiting Crew (Pr1vAt3)
Bug Bounty Playbook v1.pdf
9.8 MB
Forwarded from Exploiting Crew (Pr1vAt3)
Bug Bounty Playbook V2v.pdf
10.9 MB