Difference between revisions of "Kali Linux: nikto cek DVWA"

From OnnoWiki
Jump to navigation Jump to search
Line 35: Line 35:
  
 
  DVWA-1.9/config/
 
  DVWA-1.9/config/
 +
 +
 +
==Supaya Bisa di Exploit==
 +
 +
Skenario-nya misalnya, adminstrator server mengedit file config.inc.php
 +
supaya aman file config.inc.php di backup dulu :) ..
 +
 +
cd /var/www/html/DVWA-1.9/config/
 +
cp config.inc.php config.inc.php.bak
 +
vi config.inc.php
 +
 +
jika lupa mendelete file .bak, maka file ini bisa di ambil :) ..
 +
atau beberapa editor meninggalkan bekas
 +
 +
.config.inc.php
 +
config.inc.php~
 +
 +
terutama file ~ bisa di ambil dari luar

Revision as of 16:09, 4 April 2017

Cek

nikto --host http://192.168.0.100/DVWA-1.9/
nikto -C all --host http://192.168.0.100/DVWA-1.9/

Hasil

- Nikto v2.1.6
---------------------------------------------------------------------------
+ Target IP:          192.168.0.100
+ Target Hostname:    192.168.0.100
+ Target Port:        80
+ Start Time:         2017-04-04 05:45:21 (GMT7)
---------------------------------------------------------------------------
+ Server: Apache/2.4.18 (Ubuntu)
+ The anti-clickjacking X-Frame-Options header is not present.
+ The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
+ The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
+ Cookie PHPSESSID created without the httponly flag
+ Root page / redirects to: login.php
+ No CGI Directories found (use '-C all' to force check all possible dirs)
+ Server leaks inodes via ETags, header found with file /DVWA-1.9/robots.txt, fields: 0x1a 0x52156c6a290c0 
+ Allowed HTTP Methods: GET, HEAD, POST, OPTIONS 
+ OSVDB-3268: /DVWA-1.9/config/: Directory indexing found.
+ /DVWA-1.9/config/: Configuration information may be available remotely.
+ OSVDB-3268: /DVWA-1.9/docs/: Directory indexing found.
+ /DVWA-1.9/login.php: Admin login page/section found.
+ 7535 requests: 0 error(s) and 10 item(s) reported on remote host
+ End Time:           2017-04-04 05:45:40 (GMT7) (19 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested


Yang menarik

DVWA-1.9/config/


Supaya Bisa di Exploit

Skenario-nya misalnya, adminstrator server mengedit file config.inc.php supaya aman file config.inc.php di backup dulu :) ..

cd /var/www/html/DVWA-1.9/config/
cp config.inc.php config.inc.php.bak
vi config.inc.php

jika lupa mendelete file .bak, maka file ini bisa di ambil :) .. atau beberapa editor meninggalkan bekas

.config.inc.php
config.inc.php~

terutama file ~ bisa di ambil dari luar