Difference between revisions of "Kali Linux: nikto cek DVWA"
		
		
		
		
		
		Jump to navigation
		Jump to search
		
				
		
		
	
Onnowpurbo (talk | contribs)  | 
				Onnowpurbo (talk | contribs)   | 
				||
| Line 35: | Line 35: | ||
  DVWA-1.9/config/  |   DVWA-1.9/config/  | ||
| + | |||
| + | |||
| + | ==Supaya Bisa di Exploit==  | ||
| + | |||
| + | Skenario-nya misalnya, adminstrator server mengedit file config.inc.php  | ||
| + | supaya aman file config.inc.php di backup dulu :) ..  | ||
| + | |||
| + |  cd /var/www/html/DVWA-1.9/config/  | ||
| + |  cp config.inc.php config.inc.php.bak  | ||
| + |  vi config.inc.php  | ||
| + | |||
| + | jika lupa mendelete file .bak, maka file ini bisa di ambil :) ..  | ||
| + | atau beberapa editor meninggalkan bekas  | ||
| + | |||
| + |  .config.inc.php  | ||
| + |  config.inc.php~  | ||
| + | |||
| + | terutama file ~ bisa di ambil dari luar  | ||
Revision as of 16:09, 4 April 2017
Cek
nikto --host http://192.168.0.100/DVWA-1.9/ nikto -C all --host http://192.168.0.100/DVWA-1.9/
Hasil
- Nikto v2.1.6 --------------------------------------------------------------------------- + Target IP: 192.168.0.100 + Target Hostname: 192.168.0.100 + Target Port: 80 + Start Time: 2017-04-04 05:45:21 (GMT7) --------------------------------------------------------------------------- + Server: Apache/2.4.18 (Ubuntu) + The anti-clickjacking X-Frame-Options header is not present. + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type + Cookie PHPSESSID created without the httponly flag + Root page / redirects to: login.php + No CGI Directories found (use '-C all' to force check all possible dirs) + Server leaks inodes via ETags, header found with file /DVWA-1.9/robots.txt, fields: 0x1a 0x52156c6a290c0 + Allowed HTTP Methods: GET, HEAD, POST, OPTIONS + OSVDB-3268: /DVWA-1.9/config/: Directory indexing found. + /DVWA-1.9/config/: Configuration information may be available remotely. + OSVDB-3268: /DVWA-1.9/docs/: Directory indexing found. + /DVWA-1.9/login.php: Admin login page/section found. + 7535 requests: 0 error(s) and 10 item(s) reported on remote host + End Time: 2017-04-04 05:45:40 (GMT7) (19 seconds) --------------------------------------------------------------------------- + 1 host(s) tested
Yang menarik
DVWA-1.9/config/
Supaya Bisa di Exploit
Skenario-nya misalnya, adminstrator server mengedit file config.inc.php supaya aman file config.inc.php di backup dulu :) ..
cd /var/www/html/DVWA-1.9/config/ cp config.inc.php config.inc.php.bak vi config.inc.php
jika lupa mendelete file .bak, maka file ini bisa di ambil :) .. atau beberapa editor meninggalkan bekas
.config.inc.php config.inc.php~
terutama file ~ bisa di ambil dari luar