Hacking: Penetration Testing with Kali Linux: Guide for Beginners by William Rowley

Hacking: Penetration Testing with Kali Linux: Guide for Beginners by William Rowley

Author:William Rowley
Language: eng
Format: azw3, epub, pdf
Published: 2017-05-04T07:00:00+00:00


nikto -h websitename

After scanning the second site, the nikto tool gives me the vulnerabilities.As you can see from the above output; our website is using the Microsoft's IIS 8.5 server, not the Apache server as on our previous scan. There is also other more vulnerability which the tool has listed for us.

However, sometimes, when you try to exploit the vulnerabilities, you may realize that they are just false-positives. The reason behind this is that the site might be returning a 404 page which is harmless. Most exploits expect that the site is made with asp or PHP, but the site might not be made using such languages.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.