识别信息性发现项和 OSVDB 引用
在此步骤中,你将学习识别信息性发现项,这些项以 + 符号标记。它们不总是直接的漏洞,但提供了关于服务器配置的有用上下文。
Nikto 中的许多发现项都与 OSVDB (Open Source Vulnerability Database) ID 相关联。尽管 OSVDB 项目已不再活跃,但这些 ID 仍然可以用于历史参考和查找特定问题的详细信息。
让我们使用 grep 命令过滤报告,仅显示代表发现项的行。在 Nikto 的输出中,这些行以 + 开头。
grep "^\+" ~/project/nikto_scan_results.txt
你将看到扫描中所有发现项的列表。
+ Target IP: 172.17.0.2
+ Target Hostname: labex-server
+ Target Port: 80
+ Start Time: 2023-10-27 10:30:00 (GMT0)
+ Server: Apache/2.4.52 (Ubuntu)
+ The anti-clickjacking X-Frame-Options header is not present.
+ The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
+ The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type.
+ Uncommon header 'x-powered-by' found, with contents: PHP/8.1.2
+ Allowed HTTP Methods: GET, HEAD, POST, OPTIONS
+ OSVDB-3233: /icons/README: The Apache web server is configured to return a valid response to a request for /icons/README.
+ /index.php: PHP is installed.
+ /admin/: Directory indexing found.
+ OSVDB-3233: /cgi-bin/: directory indexing found.
+ OSVDB-3268: /cgi-bin/test.cgi: This might be interesting...
+ 8123 requests: 0 error(s) and 11 item(s) reported on remote host
+ End Time: 2023-10-27 10:38:20 (GMT0) (500 seconds)
+ 1 host(s) tested
请注意 + OSVDB-3233: /icons/README: ... 这一行。这表示一个信息性发现项(ID 3233),与 Apache 服务器上常见的 /icons/ 目录中一个公开可访问的 README 文件有关。