Website Vulnerability Scanner
About the Website Vulnerability Scanner
Finds common vulnerabilities related to web server configuration and specific web application issues.
List of tests performedHere is the complete list of tests performed by this vulnerability scanner:
|Quick Scan||Full Scan||Test performed|
|Fingerprint web server software|
|Analyze HTTP headers for security misconfiguration|
|Check the security of HTTP cookies|
|Check the SSL certificate of the server|
|Check to see whether the web server is at the latest version|
|Check if the server software is affected by known vulnerabilities|
|Analyze robots.txt for interesting URLs|
|Check whether a client access file exists, and if it contains a wildcard entry (clientaccesspolicy.xml, crossdomain.xml)|
|Discover server configuration problems such as Directory Listing|
|Check for sensitive files (archives, backups, certificates, key stores) based on hostname and some common words|
|Check for the presence of known scripts vulnerable to XSS, SQL injection, LFI, RFI and Command injection|
|Attempt to upload and delete a file through the PUT and DELETE HTTP methods|
|Test for the Bash Shellshock vulnerability|
|Find administrative pages|
|Attempt to find interesting files/functionality|
|Check for information disclosure issues|
|Identify which type of web application is running|
|Enumerate existing CGI directories|
|Attempt to enumerate users directly from the web server (/~user)|
|Check for web server XSS in Expect HTTP header|
|Check for multiple index files|
|Check the HTTP Options returned by the server|
Warning: The full scan generates a high amount of noise in the network. Most correctly configured IDSs will detect this scan as attack traffic. Do not use it if you don't have proper authorization from the target website owner.
- Target URL: This is the url of the website that will be scanned. The tool does not follow any redirects so the exact url will be scanned. If you want to scan only a certain directory or path, you can add it in the url like: http://www.mycompany.com/base_directory/. All urls must start with http or https.
- Scan type:
- Quick scan: This is a fast, passive and non-intrusive scan.
- Full scan: This is a complete assessment which covers a much broader range of security tests.
How it works
The quick scan is performed by a custom written security scanner which implements the tests described above. This scan is passive and non-intrusive, generating a maximum of 20 requests to the target application.
The full scan is performed by the well known Nikto Vulnerability Scanner which can detect specific web vulnerabilities on your target server.
Nikto implements multiple techniques for fingerprinting server software and for identifying server side vulnerabilities. It uses a signature database which is periodically updated and each signature contains a specific request that identifies an unique vulnerability.
Nikto sends a significant amount of HTTP requests to the target server in order to probe each signature from the database. However, it does not have such power to generate a denial of service effect.