{"id":17652,"date":"2015-11-19T13:31:46","date_gmt":"2015-11-19T19:31:46","guid":{"rendered":"https:\/\/secure.rosehosting.com\/blog\/?p=17652"},"modified":"2022-06-03T03:44:03","modified_gmt":"2022-06-03T08:44:03","slug":"install-nikto-web-scanner-on-an-ubuntu-vps","status":"publish","type":"post","link":"https:\/\/www.rosehosting.com\/blog\/install-nikto-web-scanner-on-an-ubuntu-vps\/","title":{"rendered":"Install Nikto web scanner on an Ubuntu VPS"},"content":{"rendered":"
Nikto is a Perl based, open source vulnerability tool which performs wide range of tests against web servers for thousands of vulnerabilities<\/a>, outdated versions and other known issues. Since Nikto is Perl based, it can run on all operating systems with Perl installed. In this tutorial we will show you how to install and use Nikto on an Ubuntu VPS<\/a>. Its installation is very easy and fast.<\/p>\n Nikto comes with many useful features, such as:<\/p>\n First of all log in to your Ubuntu VPS as user root<\/p>\n and make sure that all installed packages are up to date<\/p>\n Install some prerequisites<\/p>\n Go to Nikto’s official website and download the latest release to your server<\/p>\n Unpack the downloaded tarball archive<\/p>\n This will create a new ‘nikto-2.1.5’ directory. We will rename this directory<\/p>\n Change the current working directory and make the Perl script executable<\/p>\n Update Nikto’s database and plugins<\/p>\n For a simple test scan of your website you can run<\/p>\n If your web server listens on different port than the default one, you can use the -p switch to specify the port.<\/p>\n The output of this simple scan will give you very useful information such as XSS vulnerabilities, outdated and vulnerable web applications, and many more. You can save the output to a file using the -o switch and specify the format of the output. For example, the following command will scan your website and save the outup to a html file.<\/p>\n You can check all options supported by Nikto using the -h switch<\/p>\n Further information about Nikto can be found in their official documentation<\/a>.<\/p>\n Of course you don\u2019t have to do any of this if you use one of our Managed VPS Hosting<\/a> services, in which case you can simply ask our expert Linux admins to install Nikto for you. They are available 24\u00d77 and will take care of your request immediately.<\/p>\n PS.<\/strong><\/span> If you liked this post please share it with your friends on the social networks using the buttons on the left or simply leave a reply below. Thanks.<\/p>\n","protected":false},"excerpt":{"rendered":" Nikto is a Perl based, open source vulnerability tool which performs wide range of tests against web servers for thousands … <\/p>\n\n
ssh root@IP_ADDRESS<\/pre>\n
apt-get update && apt-get upgrade<\/pre>\n
apt-get install wget unzip libnet-ssleay-perl libwhisker2-perl openssl<\/pre>\n
cd \/opt\r\nwget https:\/\/cirt.net\/nikto\/nikto-2.1.5.tar.gz<\/pre>\n
tar xvfz nikto-2.1.5.tar.gz<\/pre>\n
mv nikto-2.1.5\/ nikto<\/pre>\n
cd nikto\/\r\nchmod +x nikto.pl<\/pre>\n
perl nikto.pl -update\r\n\r\n+ Retrieving 'nikto_cookies.plugin'\r\n+ Retrieving 'db_parked_strings'\r\n+ Retrieving 'nikto_headers.plugin'\r\n+ Retrieving 'nikto_report_csv.plugin'\r\n+ Retrieving 'db_tests'\r\n+ Retrieving 'CHANGES.txt'\r\n+ CIRT.net message: Please submit Nikto bugs to https:\/\/github.com\/sullo\/nikto<\/pre>\n
perl nikto.pl -h yourwebsite.com<\/pre>\n
perl nikto.pl -h yourwebsite.com -o scan.htm<\/pre>\n
perl nikto.pl -h\r\n\r\n-config+\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Use this config file\r\n-Display+\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Turn on\/off display outputs\r\n-dbcheck\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 check database and other key files for syntax errors\r\n-Format+\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 save file (-o) format\r\n-Help\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Extended help information\r\n-host+\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 target host\r\n-id+\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Host authentication to use, format is id:pass or id:pass:realm\r\n-list-plugins\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 List all available plugins\r\n-output+\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Write output to this file\r\n-nossl\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Disables using SSL\r\n-no404\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Disables 404 checks\r\n-Plugins+\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 List of plugins to run (default: ALL)\r\n-port+\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Port to use (default 80)\r\n-root+\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Prepend root value to all requests, format is \/directory\r\n-ssl\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Force ssl mode on port\r\n-Tuning+\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Scan tuning\r\n-timeout+\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Timeout for requests (default 10 seconds)\r\n-update\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Update databases and plugins from CIRT.net\r\n-Version\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Print plugin and database versions\r\n-vhost+\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Virtual host (for Host header)<\/pre>\n