Nikto no limit SSL scan (nikto -host duo.com -ssl)
- Nikto v2.5.0
---------------------------------------------------------------------------
+ Multiple IPs found: 13.225.63.107, 13.225.63.12, 13.225.63.85, 13.225.63.49
+ Target IP: 13.225.63.107
+ Target Hostname: duo.com
+ Target Port: 443
---------------------------------------------------------------------------
+ SSL Info: Subject: /CN=www.duosecurity.com
Altnames: www.duosecurity.com, duosecurity.co.uk, fr.duo.com, www.duosecurity.co.uk, duo.com, de.duo.com, www.duo.com, duosecurity.com
Ciphers: TLS_AES_128_GCM_SHA256
Issuer: /C=US/O=Amazon/CN=Amazon RSA 2048 M01
+ Start Time: 2024-04-13 01:07:50 (GMT-4)
---------------------------------------------------------------------------
+ Server: Duo/1.0
+ /: Retrieved via header: 1.1 e5accc89e6f6f7fa6c73134d02aeb428.cloudfront.net (CloudFront).
+ No CGI Directories found (use '-C all' to force check all possible dirs)
+ : Server banner changed from 'Duo/1.0' to 'CloudFront'.
+ /robots.txt: Entry '/resources/videos/' is returned a non-forbidden or redirect HTTP code (200). See: https://portswigger.net/kb/issues/00600600_robots-txt-file
+ /robots.txt: contains 6 entries which should be manually viewed. See: https://developer.mozilla.org/en-US/docs/Glossary/Robots.txt
+ /favicon.ico: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/
+ /: The Content-Encoding header is set to "deflate" which may mean that the server is vulnerable to the BREACH attack. See: http://breachattack.com/
+ Scan terminated: 20 error(s) and 6 item(s) reported on remote host
+ End Time: 2024-04-13 01:11:05 (GMT-4) (195 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested
Color Scheme
Target
duo.com
Scan method
Nikto no limit SSL scan
Run command
nikto -host duo.com -ssl
Scan time
195s
Scan date
13 Apr 2024 01:11
Copy scan report
Download report
Remove scan result
$
We use cookies to ensure you get the best experience on our website. Cookie policy