- Nikto --------------------------------------------------------------------------- + Target IP: 23.204.11.32 + Target Hostname: www.aliexpress.com + Target Port: 80 + Start Time: 2024-09-05 16:40:52 (GMT-4) --------------------------------------------------------------------------- + Server: Tengine/Aserver + /: IP address found in the 'x-akamai-fwd-auth-data' header. The IP is "23.195.36.164". See: https://portswigger.net/kb/issues/00600300_private-ip-addresses-disclosed + /: IP address found in the 'x-akamai-fwd-auth-data' header. The IP is "172.96.166.66". See: https://portswigger.net/kb/issues/00600300_private-ip-addresses-disclosed + /: Uncommon header 'x-akamai-fwd-auth-sign' found, with contents: T5jpQ84VX//qyDFdXRg2BYUIio/ik2tjpmra/PnXeh8Lu1+j6HPtPbBOJumQLNHDsPYmhDeS19hcHIDsYs33mOafGMmm2EGyj9SP/o3oLo4=. + /: Uncommon header 'x-akamai-fwd-auth-sha' found, with contents: 5C12070A614AE4AC4F90FB9A697B228D5D9CE4DEE470248E3E0A930DFF8E16EE. + /: Uncommon header 'x-akamai-fwd-auth-data' found, with contents: 1632249010, 23.195.36.164, 1725568852, 172.96.166.66. + /: Uncommon header 'eagleeye-traceid' found, with contents: 2103254117255688520512096eb38f. + /: Uncommon header 'server-timing' found, with multiple values: (edge; dur=1,origin; dur=7,cdn-cache; desc=MISS,ak_p; desc="1725568852041_398664868_252166595_808_6475_1_0_-";dur=1,). + Root page / redirects to: https://www.aliexpress.com/ + /TZgqAGRN.js: IP address found in the 'aliaka_real_ip' header. The IP is "172.96.166.66". See: https://portswigger.net/kb/issues/00600300_private-ip-addresses-disclosed + /TZgqAGRN.js: Uncommon header 'z_ak_client_ip' found, with contents: 127.0.0.1. + No CGI Directories found (use '-C all' to force check all possible dirs) + /favicon.ico: Retrieved access-control-allow-origin header: http://hz.aliexpress.com. + /favicon.ico: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/ + : Server banner changed from 'Tengine/Aserver' to 'AkamaiGHost'. + /Mem/dynaform/Login.htm?WINDWEB_URL=%2FMem%2Fdynaform%2FLogin.htm&ListIndexUser=0&sWebParam1=admin000: Cookie ali_apache_id created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies + /Mem/dynaform/Login.htm?WINDWEB_URL=%2FMem%2Fdynaform%2FLogin.htm&ListIndexUser=0&sWebParam1=admin000: IP address found in the 'ali_apache_id' cookie. The IP is "33.3.37.52". + /Mem/dynaform/Login.htm?WINDWEB_URL=%2FMem%2Fdynaform%2FLogin.htm&ListIndexUser=0&sWebParam1=admin000: Cookie xman_us_f created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies + /Mem/dynaform/Login.htm?WINDWEB_URL=%2FMem%2Fdynaform%2FLogin.htm&ListIndexUser=0&sWebParam1=admin000: Cookie intl_locale created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies + /Mem/dynaform/Login.htm?WINDWEB_URL=%2FMem%2Fdynaform%2FLogin.htm&ListIndexUser=0&sWebParam1=admin000: Cookie acs_usuc_t created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies + /Mem/dynaform/Login.htm?WINDWEB_URL=%2FMem%2Fdynaform%2FLogin.htm&ListIndexUser=0&sWebParam1=admin000: Cookie aep_usuc_f created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies + /Mem/dynaform/Login.htm?WINDWEB_URL=%2FMem%2Fdynaform%2FLogin.htm&ListIndexUser=0&sWebParam1=admin000: Retrieved x-application-context header: global-biz-gateway:9901. + /Mem/dynaform/Login.htm?WINDWEB_URL=%2FMem%2Fdynaform%2FLogin.htm&ListIndexUser=0&sWebParam1=admin000: Uncommon header 'x-application-context' found, with contents: global-biz-gateway:9901. + Scan terminated: 0 error(s) and 20 item(s) reported on remote host + End Time: 2024-09-05 16:41:53 (GMT-4) (61 seconds) --------------------------------------------------------------------------- + 1 host(s) tested