Found
Duration
Date
IP
- Nikto --------------------------------------------------------------------------- + Target IP: 68.178.220.248 + Target Hostname: luckyshots.org + Target Port: 80 + Start Time: 2025-01-23 18:07:28 (GMT-8) --------------------------------------------------------------------------- + Server: Apache + /: Retrieved x-powered-by header: PHP/7.4.33. + /: Link header found with value: <http://luckyshots.org/wp-json/>; rel="https://api.w.org/", <http://luckyshots.org/wp-json/wp/v2/pages/75>; rel="alternate"; type="application/json", <http://luckyshots.org/>; rel=shortlink. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Link + /: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/ + /40OMNByE.: Uncommon header 'x-redirect-by' found, with contents: WordPress. + No CGI Directories found (use '-C all' to force check all possible dirs) + /robots.txt: contains 2 entries which should be manually viewed. See: https://developer.mozilla.org/en-US/docs/Glossary/Robots.txt + /wp-content/uploads/2023/05/cropped-cropped-order2962-green-no-bg-32x32.png: Server may leak inodes via ETags, header found with file /wp-content/uploads/2023/05/cropped-cropped-order2962-green-no-bg-32x32.png, inode: 31457799, size: 2724, mtime: Thu May 25 00:02:10 2023. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1418 + Scan terminated: 0 error(s) and 6 item(s) reported on remote host + End Time: 2025-01-23 18:08:29 (GMT-8) (61 seconds) --------------------------------------------------------------------------- + 1 host(s) tested