Found
Duration
Date
IP
- Nikto v2.5.0 --------------------------------------------------------------------------- + Target IP: 44.238.29.244 + Target Hostname: testasp.vulnweb.com + Target Port: 80 + Start Time: 2024-06-27 18:19:06 (GMT-4) --------------------------------------------------------------------------- + Server: Microsoft-IIS/8.5 + /: Cookie ASPSESSIONIDSATCRQRD created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies + /: Retrieved x-powered-by header: ASP.NET. + /: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/ + /fxoNtok6.asmx: Retrieved x-aspnet-version header: 2.0.50727. + RFC-1918 /aspnet_client: IP address found in the 'location' header. The IP is "10.0.0.14". See: https://portswigger.net/kb/issues/00600300_private-ip-addresses-disclosed + /aspnet_client: The web server may reveal its internal or real IP in the Location header via a request to with HTTP/1.0. The value is "10.0.0.14". See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0649 + OPTIONS: Allowed HTTP Methods: OPTIONS, TRACE, GET, HEAD, POST . + OPTIONS: Public HTTP Methods: OPTIONS, TRACE, GET, HEAD, POST . + Scan terminated: 0 error(s) and 8 item(s) reported on remote host + End Time: 2024-06-27 18:20:07 (GMT-4) (61 seconds) --------------------------------------------------------------------------- + 1 host(s) tested