Found
Duration
Date
IP
- Nikto --------------------------------------------------------------------------- + Multiple IPs found: 93.184.215.14, 2606:2800:21f:cb07:6820:80da:af6b:8b2c + Target IP: 93.184.215.14 + Target Hostname: example.com + Target Port: 443 --------------------------------------------------------------------------- + SSL Info: Subject: /C=US/ST=California/L=Los Angeles/O=Internet\xC2\xA0Corporation\xC2\xA0for\xC2\xA0Assigned\xC2\xA0Names\xC2\xA0and\xC2\xA0Numbers/CN=www.example.org Altnames: www.example.org, example.net, example.edu, example.com, example.org, www.example.com, www.example.edu, www.example.net Ciphers: TLS_AES_256_GCM_SHA384 Issuer: /C=US/O=DigiCert Inc/CN=DigiCert Global G2 TLS RSA SHA256 2020 CA1 + Start Time: 2024-11-17 12:27:07 (GMT-5) --------------------------------------------------------------------------- + Server: ECAcc (nyd/D149) + : Server banner changed from 'ECAcc (nyd/D149)' to 'ECAcc (nyd/D17C)'. + /: The site uses TLS and the Strict-Transport-Security HTTP header is not defined. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security + /: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/ + No CGI Directories found (use '-C all' to force check all possible dirs) + /: The Content-Encoding header is set to "deflate" which may mean that the server is vulnerable to the BREACH attack. See: http://breachattack.com/ + OPTIONS: Allowed HTTP Methods: OPTIONS, GET, HEAD, POST . + Scan terminated: 0 error(s) and 5 item(s) reported on remote host + End Time: 2024-11-17 12:28:08 (GMT-5) (61 seconds) --------------------------------------------------------------------------- + 1 host(s) tested