- Nikto v2.5.0 --------------------------------------------------------------------------- + Multiple IPs found: 13.225.63.107, 13.225.63.12, 13.225.63.85, 13.225.63.49 + Target IP: 13.225.63.107 + Target Hostname: duo.com + Target Port: 443 --------------------------------------------------------------------------- + SSL Info: Subject: /CN=www.duosecurity.com Altnames: www.duosecurity.com, duosecurity.co.uk, fr.duo.com, www.duosecurity.co.uk, duo.com, de.duo.com, www.duo.com, duosecurity.com Ciphers: TLS_AES_128_GCM_SHA256 Issuer: /C=US/O=Amazon/CN=Amazon RSA 2048 M01 + Start Time: 2024-04-13 01:07:50 (GMT-4) --------------------------------------------------------------------------- + Server: Duo/1.0 + /: Retrieved via header: 1.1 e5accc89e6f6f7fa6c73134d02aeb428.cloudfront.net (CloudFront). + No CGI Directories found (use '-C all' to force check all possible dirs) + : Server banner changed from 'Duo/1.0' to 'CloudFront'. + /robots.txt: Entry '/resources/videos/' is returned a non-forbidden or redirect HTTP code (200). See: https://portswigger.net/kb/issues/00600600_robots-txt-file + /robots.txt: contains 6 entries which should be manually viewed. See: https://developer.mozilla.org/en-US/docs/Glossary/Robots.txt + /favicon.ico: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/ + /: The Content-Encoding header is set to "deflate" which may mean that the server is vulnerable to the BREACH attack. See: http://breachattack.com/ + Scan terminated: 20 error(s) and 6 item(s) reported on remote host + End Time: 2024-04-13 01:11:05 (GMT-4) (195 seconds) --------------------------------------------------------------------------- + 1 host(s) tested