- Nikto --------------------------------------------------------------------------- + Multiple IPs found: 216.128.137.80, 2001:19f0:6401:274:5400:4ff:fe30:6fa1 + Target IP: 216.128.137.80 + Target Hostname: hamradioemail.com + Target Port: 443 --------------------------------------------------------------------------- + SSL Info: Subject: /CN=hamradioemail.com Altnames: autoconfig.hamradioemail.com, autoconfig.k5knv.hamradioemail.com, autodiscover.hamradioemail.com, autodiscover.k5knv.hamradioemail.com, hamradioemail.com, k5knv.hamradioemail.com, mta-sts.hamradioemail.com, mta-sts.k5knv.hamradioemail.com, openpgpkey.hamradioemail.com, openpgpkey.k5knv.hamradioemail.com, www.hamradioemail.com Ciphers: TLS_AES_256_GCM_SHA384 Issuer: /C=US/O=Let's Encrypt/CN=R11 + Start Time: 2024-10-28 11:07:50 (GMT-4) --------------------------------------------------------------------------- + Server: nginx + /: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/ + No CGI Directories found (use '-C all' to force check all possible dirs) + /Autodiscover/Autodiscover.xml: Default account found for 'ZPush' at (ID 'user', PW ''). D-Link router. See: CWE-16 + Scan terminated: 18 error(s) and 2 item(s) reported on remote host + End Time: 2024-10-28 11:30:47 (GMT-4) (1377 seconds) --------------------------------------------------------------------------- + 1 host(s) tested