Scan report for "www.mtn.zm"

Membership level: Free member
Summary

Found

-

Duration

1min 1sec

Date

2024-08-11

IP

-

Report
Nikto SSL scan (max 60 sec) (nikto -host www.mtn.zm -ssl -maxtime 60)
- Nikto 
---------------------------------------------------------------------------
+ Target IP:          192.0.66.168
+ Target Hostname:    www.mtn.zm
+ Target Port:        443
---------------------------------------------------------------------------
+ SSL Info:        Subject:  /C=ZM/L=Lusaka/O=MTN (ZAMBIA) LIMITED/CN=*.mtn.zm
                   Altnames: *.mtn.zm, www.mtn.zm, mtn.zm
                   Ciphers:  TLS_AES_256_GCM_SHA384
                   Issuer:   /C=US/O=DigiCert Inc/CN=DigiCert Global G2 TLS RSA SHA256 2020 CA1
+ Start Time:         2024-08-11 16:47:53 (GMT-4)
---------------------------------------------------------------------------
+ Server: nginx
+ /: Retrieved x-powered-by header: WordPress VIP <https://wpvip.com>.
+ /:X-Frame-Options header is deprecated and has been replaced with the Content-Security-Policy HTTP header with the frame-ancestors directive instead. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options
+ /: Link header found with value: ARRAY(0x555cacc76f50). See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Link
+ /: Uncommon header 'x-hacker' found, with contents: If you're reading this, you should visit wpvip.com/careers and apply to join the fun, mention this header.
+ /: Uncommon header 'x-rq' found, with contents: jfk2 96 184 443.
+ /: Uncommon header 'host-header' found, with contents: a9130478a60e5f9135f765b23f26593b.
+ /vb9J48Fo.: Uncommon header 'x-redirect-by' found, with contents: WordPress.
+ No CGI Directories found (use '-C all' to force check all possible dirs)
+ /robots.txt: contains 2 entries which should be manually viewed. See: https://developer.mozilla.org/en-US/docs/Glossary/Robots.txt
+ /favicon.ico: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/
+ /: The Content-Encoding header is set to "deflate" which may mean that the server is vulnerable to the BREACH attack. See: http://breachattack.com/
+ Scan terminated: 0 error(s) and 10 item(s) reported on remote host
+ End Time:           2024-08-11 16:48:54 (GMT-4) (61 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested
Detailed report
Target
www.mtn.zm
Scan method
Nikto SSL scan (max 60 sec)
Run command
nikto -host www.mtn.zm -ssl -maxtime 60
Duration
Quick report
Scan date
11 Aug 2024 16:48
Copy scan report
Download report
Remove scan result
$
Total scans
Check ports
Wordpress site
API - Scan ID