Scan report for "duo.com"

Membership level: Free member
Nikto no limit SSL scan (nikto -host duo.com -ssl)
- Nikto v2.5.0
---------------------------------------------------------------------------
+ Multiple IPs found: 13.225.63.107, 13.225.63.12, 13.225.63.85, 13.225.63.49
+ Target IP:          13.225.63.107
+ Target Hostname:    duo.com
+ Target Port:        443
---------------------------------------------------------------------------
+ SSL Info:        Subject:  /CN=www.duosecurity.com
                   Altnames: www.duosecurity.com, duosecurity.co.uk, fr.duo.com, www.duosecurity.co.uk, duo.com, de.duo.com, www.duo.com, duosecurity.com
                   Ciphers:  TLS_AES_128_GCM_SHA256
                   Issuer:   /C=US/O=Amazon/CN=Amazon RSA 2048 M01
+ Start Time:         2024-04-13 01:07:50 (GMT-4)
---------------------------------------------------------------------------
+ Server: Duo/1.0
+ /: Retrieved via header: 1.1 e5accc89e6f6f7fa6c73134d02aeb428.cloudfront.net (CloudFront).
+ No CGI Directories found (use '-C all' to force check all possible dirs)
+ : Server banner changed from 'Duo/1.0' to 'CloudFront'.
+ /robots.txt: Entry '/resources/videos/' is returned a non-forbidden or redirect HTTP code (200). See: https://portswigger.net/kb/issues/00600600_robots-txt-file
+ /robots.txt: contains 6 entries which should be manually viewed. See: https://developer.mozilla.org/en-US/docs/Glossary/Robots.txt
+ /favicon.ico: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/
+ /: The Content-Encoding header is set to "deflate" which may mean that the server is vulnerable to the BREACH attack. See: http://breachattack.com/
+ Scan terminated: 20 error(s) and 6 item(s) reported on remote host
+ End Time:           2024-04-13 01:11:05 (GMT-4) (195 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested
Color Scheme
Target
duo.com
Scan method
Nikto no limit SSL scan
Run command
nikto -host duo.com -ssl
Scan time
195s
Scan date
13 Apr 2024 01:11
Copy scan report
Download report
Remove scan result
$
Some firewalls blocks Nikto. For get true positive results add nikto.online IP addresses (172.96.166.66-172.96.166.70 or CIDR 172.96.166.64/29) to the whitelist
[scan_method]
Visibility:
Scan method: