Scan report for "techcrunch.com"

Membership level: Free member
Nikto no limit SSL scan (nikto -host techcrunch.com -ssl)
- Nikto v2.5.0
---------------------------------------------------------------------------
+ Multiple IPs found: 76.13.32.141, 2001:4998:124:1704::5000
+ Target IP:          76.13.32.141
+ Target Hostname:    techcrunch.com
+ Target Port:        443
---------------------------------------------------------------------------
+ SSL Info:        Subject:  /C=US/ST=New York/L=New York/O=Yahoo Holdings Inc./CN=www.makers.com
                   Altnames: www.makers.com, www.intheknow.com, www.builtbygirls.com, www.aol.jp, www.aol.de, www.aol.co.uk, www.aol.ca, welcomescreen.aol.de, wave.builtbygirls.com, wave-stage.builtbygirls.com, w.sb.welcomescreen.aol.com, w.main.welcomescreen.aol.com, venta.automoviles.aol.com, toshiba.aol.ca, techcrunch.com, talktalk.aol.co.uk, support.builtbygirls.com, strictlyvc.com, shop.intheknow.com, premium.yahoofinance.com, o2.welcomescreen.aol.de, o2.aol.de, news.aol.jp, n.sb.welcomescreen.aol.com, n.main.welcomescreen.aol.com, fluxible.io.yahoo.net, engadget.com, brb.yahoo.net, autoblog.com, aolbroadband.welcomescreen.aol.co.uk, aol.com, acss.io.yahoo.net, *.techcrunch.com, *.strictlyvc.com, *.shop.intheknow.com, *.rivals.com, *.rivals-staging.com, *.rivals-acceptance.com, *.n.rivals.com, *.forums.rivals.com, *.forums.rivals-staging.com, *.forums.rivals-acceptance.com, *.engadget.com, *.cashay.com, *.autoblog.com, *.aol.com
                   Ciphers:  TLS_AES_128_GCM_SHA256
                   Issuer:   /C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert SHA2 High Assurance Server CA
+ Start Time:         2024-04-12 10:49:02 (GMT-4)
---------------------------------------------------------------------------
+ Server: ATS
+ /: Retrieved x-powered-by header: WordPress VIP <https://wpvip.com>.
+ /:X-Frame-Options header is deprecated and has been replaced with the Content-Security-Policy HTTP header with the frame-ancestors directive instead. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options
+ /: Link header found with value: <https://techcrunch.com/wp-json/>; rel="https://api.w.org/". See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Link
+ /: Uncommon header 'host-header' found, with contents: a9130478a60e5f9135f765b23f26593b.
+ /: Uncommon header 'x-rq' found, with contents: yyz3 85 188 443.
+ /: Uncommon header 'x-hacker' found, with contents: If you're reading this, you should visit wpvip.com/careers and apply to join the fun, mention this header.
+ /w9etvjUF/: Uncommon header 'x-redirect-by' found, with contents: WordPress.
+ No CGI Directories found (use '-C all' to force check all possible dirs)
+ /*?customize_changeset_uuid=*/: Uncommon header 'x-bypass-ssl-transform' found, with contents: 1.
+ /robots.txt: contains 2 entries which should be manually viewed. See: https://developer.mozilla.org/en-US/docs/Glossary/Robots.txt
+ /: The Content-Encoding header is set to "deflate" which may mean that the server is vulnerable to the BREACH attack. See: http://breachattack.com/
+ /: Web Server returns a valid response with junk HTTP methods which may cause false positives.
+ /search/htx/sqlqhit.asp: Uncommon header 'x-elasticpress-query' found, with contents: true.
+ /account/: Uncommon header 'x-safe-redirect-manager' found, with contents: true.
+ /wp-links-opml.php: This WordPress script reveals the installed version.
+ /wordpress/wp-links-opml.php: This WordPress script reveals the installed version.
+ /: A Wordpress installation was found.
+ /wordpress/: A Wordpress installation was found.
+ /wp-login.php?action=register: Cookie wordpress_test_cookie created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies
+ /blog/wp-login.php: Wordpress login found.
+ /wp-login.php: Wordpress login found.
+ /wordpress/wp-login.php: Wordpress login found.
+ /ads.txt: The ads.txt file can reveal information about Google Adwords or other advertising networks in use.
+ 7963 requests: 0 error(s) and 22 item(s) reported on remote host
+ End Time:           2024-04-12 13:04:36 (GMT-4) (8134 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested
Color Scheme
Target
techcrunch.com
Scan method
Nikto no limit SSL scan
Run command
nikto -host techcrunch.com -ssl
Scan time
8134s
Scan date
12 Apr 2024 13:04
Copy scan report
Download report
Remove scan result
$
Some firewalls blocks Nikto. For get true positive results add nikto.online IP addresses (172.96.166.66-172.96.166.70 or CIDR 172.96.166.64/29) to the whitelist
[scan_method]
Visibility:
Scan method: