Scan report for "www.aeromexicobusiness.com"

Membership level: Free member
Nikto no limit SSL scan (nikto -host www.aeromexicobusiness.com -ssl)
- Nikto v2.5.0
---------------------------------------------------------------------------
+ Multiple IPs found: 52.86.135.205, 44.212.235.7
+ Target IP:          52.86.135.205
+ Target Hostname:    www.aeromexicobusiness.com
+ Target Port:        443
---------------------------------------------------------------------------
+ SSL Info:        Subject:  /C=MX/L=Ciudad de Mexico/O=Aerovias de Mexico SA de CV/CN=*.aeromexicobusiness.com
                   Altnames: *.aeromexicobusiness.com, aeromexicobusiness.com
                   Ciphers:  TLS_AES_128_GCM_SHA256
                   Issuer:   /C=US/O=DigiCert Inc/OU=www.digicert.com/CN=GeoTrust TLS RSA CA G1
+ Start Time:         2024-04-20 03:26:08 (GMT-4)
---------------------------------------------------------------------------
+ Server: No banner retrieved
+ /: Retrieved via header: 1.1 spaces-router (7186aa94a765).
+ /: Retrieved access-control-allow-origin header: https://aeromexicob2b.my.salesforce-sites.com/comunidades/services/apexrest/Encuestas https://be-aeromexicobusiness.herokuapp.com/api/ https://be-aeromexicobusiness.herokuapp.com https://trnscbt.amxcomm.com/api/mail https://trnscbt.amxcomm.com/api/v1/auth https://dyn-tranccb-dq.amlab7.com/api/mail https://dyn-tranccb-ac.amlab7.com/api/v1/auth https://dyn-tranccb-ac.amlab7.com/api/mail https://dyn-tranccb-ac.amlab7.com/mail wss://streaming.mypurecloud.com https://api.mypurecloud.com/api/v2/webchat/guest/conversations/ https://api.mypurecloud.com/ https://www.google-analytics.com https://stats.g.doubleclick.net https://ambiz-001.herokuapp.com https://aeromexico.com https://be-uat-aeromexicobusiness.herokuapp.com https://aeromexicob2b--tradesite.sandbox.my.salesforce-sites.com https://cdnjs.cloudflare.com/ajax/libs/slick-carousel/1.6.0/fonts/  https://apps.mypurecloud.com/webfonts/fonts/roboto/ https://be-aeromexicobusiness.herokuapp.com https://ambiz-sec-001-fe10faa21f75.herokuapp.com/ https://ambiz-d79479bdb79c.herokuapp.com/ https://ambiz-001.herokuapp.com/ https://aeromexicob2b.my.salesforce-sites.com/ https://aeromexicob2b--tradesite.sandbox.my.salesforce-sites.com/ https://aeromexicob2b.file.force.com https://aeromexicob2b--c.documentforce.com https://www.google-analytics.com https://www.googletagmanager.com https://apps.mypurecloud.com https://www.google-analytics.com https://www.youtube.com/ https://cdnjs.cloudflare.com https://apps.mypurecloud.com.
+ /:X-Frame-Options header is deprecated and has been replaced with the Content-Security-Policy HTTP header with the frame-ancestors directive instead. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options
+ /kkHtxHsZ/: Uncommon header 'refresh' found, with contents: 0;url=/kkHtxHsZ.
+ No CGI Directories found (use '-C all' to force check all possible dirs)
+ /: The Content-Encoding header is set to "deflate" which may mean that the server is vulnerable to the BREACH attack. See: http://breachattack.com/
+ Scan terminated: 20 error(s) and 5 item(s) reported on remote host
+ End Time:           2024-04-20 03:26:42 (GMT-4) (34 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested
Color Scheme
Target
www.aeromexicobusiness.com
Scan method
Nikto no limit SSL scan
Run command
nikto -host www.aeromexicobusiness.com -ssl
Scan time
34s
Scan date
20 Apr 2024 03:26
Copy scan report
Download report
Remove scan result
$
Some firewalls blocks Nikto. For get true positive results add nikto.online IP addresses (172.96.166.66-172.96.166.70 or CIDR 172.96.166.64/29) to the whitelist
[scan_method]
Visibility:
Scan method: