Scan for Vulnerabilities on Any Website Using Nikto [Tutorial]

Поделиться
HTML-код
  • Опубликовано: 21 ноя 2024
  • ХоббиХобби

Комментарии • 348

  • @elikirkwood4580
    @elikirkwood4580 5 лет назад +906

    Remember kiddies, don't try this at home. Go to a friend's house

    • @raymondy6302
      @raymondy6302 5 лет назад +20

      Eli Kirkwood or use a vpn

    • @busyhacker8129
      @busyhacker8129 5 лет назад +27

      Or you can you both Tor and vpn for 99% security.

    • @busyhacker8129
      @busyhacker8129 5 лет назад +7

      @Islaminame
      Well ,in case of mobile phones if you try to use 2 vpns +Tor then your battery will decrease in huge amount like water from glass( if glass bends) because vpn's uses much battery as compared to Tor.

    • @mrKhanplus123
      @mrKhanplus123 5 лет назад +3

      hhhhhhhh

    • @sweetimpala
      @sweetimpala 5 лет назад +7

      whys that? what are the possible risk doing this at home?

  • @misterx8014
    @misterx8014 5 лет назад +175

    Moral of this video: Never ever blink when u're explaining something to someone..

  • @rickmonarch4552
    @rickmonarch4552 5 лет назад +131

    At 1:52 HE ALMOST BLINKED :OOOOOOO!!!4

    • @onions5113
      @onions5113 4 года назад +1

      what do you mean blink i only seen that comment blink blink blink!!

    • @vladobjelis223
      @vladobjelis223 4 года назад

      AHHAHAHAHAHAHAHAHAHAHAHHAHAHAHA good one!

  • @galihpa
    @galihpa 5 лет назад +82

    Sir next time you record a terminal window, please remember to increase the font size so that we can see the text clearly

    • @dareknaszlaku
      @dareknaszlaku 5 лет назад +1

      Indonesia switch to 720p or 1080p.

    • @IgorogI1000
      @IgorogI1000 5 лет назад +4

      i had to use the system magnifier and a real one to be able to read

    • @Crazy--Clown
      @Crazy--Clown 4 года назад

      Use a magnifying glass

    • @nobeltnium
      @nobeltnium 4 года назад

      I had to use a microscope

    • @rifqioktario5546
      @rifqioktario5546 4 года назад

      Ah masa gakeliatan

  • @paprika5487
    @paprika5487 5 лет назад +29

    I would love to see a part 2 of this in which you actually do pair the nikto output with some metasploit exploit. I find interpreting nikto output to be very, very difficult in relation to next steps.

    • @swine13
      @swine13 4 года назад +2

      Right? I feel like i need a tutorial about how to make sense of the various outputs you can get

  • @5thfloor584
    @5thfloor584 3 года назад +7

    @15:20 thanks bro for telling me that at the very end, I thought Nikto was practically the same as nmap, so I ran it without a vpn.

    • @fritzz1593
      @fritzz1593 3 года назад +1

      Thanks bro for telling me

  • @thomasle8317
    @thomasle8317 Год назад +1

    You can zoom screen when you type command line, it truly useful for us to following.

  • @theopposition173
    @theopposition173 4 года назад +4

    That electric sound effect at the end of the video - you got me. I even felt the vibration coming from my laptop. Fuck sake.

  • @stevenlewin4129
    @stevenlewin4129 2 года назад +2

    Why hasn't this guy got a million subs he is way better then David bombal and network chuck

  • @kfp1200
    @kfp1200 4 года назад +55

    This dude is actually staring at my soul in every video 🥴

    • @sluvvr
      @sluvvr 4 года назад

      Y e a h 😶

    • @djparty95
      @djparty95 3 года назад +1

      Be careful! Staring in your history my be worse.

    • @abhishekpatil5768
      @abhishekpatil5768 2 года назад

      @@djparty95 🤣🤣

  • @mrsmith4534
    @mrsmith4534 5 лет назад +17

    Yes, finally we get to see u again

  • @saiddope2241
    @saiddope2241 Год назад +1

    This channel is a gem

  • @Dave-kq7gv
    @Dave-kq7gv 5 лет назад +48

    cool content as always, man! Would it be possible for you to ctrl-shift-+ your terminal windows? Some of the smaller text doesn't render well after youtube's processing/compression/whatever

    • @NullByteWHT
      @NullByteWHT  5 лет назад +20

      We'll make it bigger in future episodes

    • @MartianMoon
      @MartianMoon 5 лет назад +3

      Null Byte thank you!

    • @mohsintahir8906
      @mohsintahir8906 4 года назад

      what type of terminal u r talking about is this linux i use ctrl + alt + t

    • @A101-v6k
      @A101-v6k 4 года назад

      @@mohsintahir8906 ctrl-shift-+ increases the text size *while* in the terminal

  • @theitguy3096
    @theitguy3096 4 года назад +5

    Just a friendly feedback: you may magnify the terminals, especially when typing the commands when the terminal is cleared and empty, e.g. @ 9:23. The clip looks like a blank screen with some little ascii on the top! :)

  • @dacman61
    @dacman61 5 лет назад +21

    Excellent video! Thank you for walking us through this process with great, efficient tips along the way. Very helpful.

  • @fudoshin2776
    @fudoshin2776 4 года назад

    I done this using a VPN and used my Linux server on Hyper V manager! Love your videos!!!

    • @mohsintahir8906
      @mohsintahir8906 4 года назад

      is there any free vpn and best?

    • @fudoshin2776
      @fudoshin2776 4 года назад

      new era 2017 most free VPNS are not premium and pretty shit. I would recommend paying for one or just using a free trial

    • @mohsintahir8906
      @mohsintahir8906 4 года назад

      @@fudoshin2776 gud suggestion is there any trail bases for a long period supported 3 to 4 months

    • @fudoshin2776
      @fudoshin2776 4 года назад

      new era 2017 no I don’t think so ( very unlikely) Different VPN providers have different time period free trials, some 7 days, 3 days, 1 month etc

    • @mohsintahir8906
      @mohsintahir8906 4 года назад

      @@fudoshin2776 nice

  • @poms3559
    @poms3559 5 лет назад +8

    One of the first viewers. Yesss!!!

  • @Uneke
    @Uneke 5 лет назад

    Ever thought of following up this video with an msf meterpreter video?
    You should definitely delve into it!

  • @ericcolt8078
    @ericcolt8078 5 лет назад +2

    Thanks Null Byte ! what would you personally recommend if you compare Burp suite vs Nikto ? for reconning and excuting and even saving databases on your targets ?

  • @1980cantrell
    @1980cantrell 5 лет назад +4

    I love nikto. I incorporated it into a tool I wrote in python. 😁.
    Great video , once again.😎😎

    • @mentix002
      @mentix002 5 лет назад +1

      Tool*. And making a system command via a Python script isn't really something to be proud of.

    • @netbin
      @netbin 5 лет назад

      Can you show me some examples of your incorporation please?

    • @0dyss3us51
      @0dyss3us51 5 лет назад +7

      @@mentix002 auch way to stifle people growth and curiosity. What a role model.

    • @NullByteWHT
      @NullByteWHT  5 лет назад +6

      @Manan Yadav Why are you like this.

    • @1980cantrell
      @1980cantrell 5 лет назад +1

      @@netbin build your tools and call nikto to scan for vulnerabilities. If any found than call to search for exploits if there are any than build your app/tool to execute payload.
      I can't give u an example here too much to write but if u search how to call nmap or nikto to use in python script it will show u how to call other tools to use in ur app..

  • @h4ckni0r38
    @h4ckni0r38 5 лет назад

    Hey, Whats Up Kody, I Saw U I Kak5 Five And Wanted To Say, You Have Done A Very Good Job With This Channel

  • @Niteshshaw2011
    @Niteshshaw2011 5 лет назад +1

    I love you videos. ♥️
    Terminal Tex in this video is very small. Plz increase the font size next time. Great work guys 👍👍👍👌👌👌

  • @angryoldcanadian3905
    @angryoldcanadian3905 5 лет назад +3

    we need tutorials on Klatu and verata next

  • @philipsuser6203
    @philipsuser6203 2 года назад +1

    Are we blinking at the same time? Or he won't blinking

  • @jr8gong
    @jr8gong 5 лет назад +7

    good stuff but you need a magnifying glass to see the commands

    • @mohsintahir8906
      @mohsintahir8906 4 года назад

      hahaaha he safe his site they just tell how its work

  • @ProfoundKnowledge
    @ProfoundKnowledge Год назад

    May I ask what OS u are using that is best suited for cybersecurity activities 'cause I intend to buy a new one

  • @SatyamWakchaure
    @SatyamWakchaure 2 года назад

    Your videos are great, really really helpful 👍🏻
    But why don’t you make the font bigger ??
    Please we need that.

  • @mavericks.9638
    @mavericks.9638 4 года назад +1

    sir @Null Byte do you hack with your mac OS terminal or use a VM?

  • @noelremasu
    @noelremasu 2 года назад

    Great tutorial.. in your next videos please zoom in or increase the fonts of your terminal for better visibility

  • @dareknaszlaku
    @dareknaszlaku 5 лет назад

    Have you done any Maltego episode? I just found most of it is America „focused” .

  • @vikrambc6906
    @vikrambc6906 5 лет назад +1

    Hello, please provide a session on doing external pen test against public IP

  • @falcon_95
    @falcon_95 4 года назад +1

    Hey really nice !
    Do you know how to bypass firewalls ? For some reason, -sS flag doesnt work when the network is set up with firewall or antivirus

  • @johnvsf
    @johnvsf Год назад

    Great video! Thank you for sharing!

  • @un4v5s83
    @un4v5s83 9 месяцев назад

    thank you very much for the nikto tutorial man

  • @tota_trader
    @tota_trader 8 месяцев назад

    very nicely explained. Thanks

  • @dervxerox
    @dervxerox Год назад +1

    "Now, before you start running Nikto on every site you can think of.." You should have put that warning near the beginning. 😅😅

  • @m1ni_m4l
    @m1ni_m4l 3 года назад +1

    Nice class about active scan in websites. But what you've said about using a vpn or thor cause of the "suspicious" behaviour with these tools gave me a doubt.
    I'm participating some bugbounty programs, and will only use this tool in authorized scopes of programs. Do you think is needed to use a vpn to hide my ip adress? What do you think about this? Thanks for the knowledge!

    • @bazookie7577
      @bazookie7577 2 года назад

      Tbh I would use a VPN or proxies no matter WHAT. I wouldn't risk it

  • @sonofarabia3640
    @sonofarabia3640 5 лет назад +14

    Fun fact.
    Saying nikto to Saudi. Can lead to injuries.
    Lol

    • @KINGCASH1337
      @KINGCASH1337 5 лет назад +4

      Nikto means fucked him

    • @slaffkas
      @slaffkas 5 лет назад +1

      Nikto means "nobody" in Russian.

  • @generalregistry
    @generalregistry 4 года назад

    Just wanted to say thank you for your channel 👍I appreciate your presentations

  • @aakankinskywalker384
    @aakankinskywalker384 9 месяцев назад +1

    well the website I was trying to do sql attack on blocked my IP 😅

  • @mohsintahir8906
    @mohsintahir8906 4 года назад

    i like that sepread this just for knowledge purpose

  • @Laflamablanca969
    @Laflamablanca969 5 лет назад +1

    Awesome vid. I don’t think you blinked the entire time 😂👍

    • @cry6270
      @cry6270 4 года назад

      maybe he is reading what to say in the camera :)

  • @folgendhego7916
    @folgendhego7916 4 года назад

    the best BLINK all the time 1:82

  • @kiranrandhawa4709
    @kiranrandhawa4709 4 года назад

    @1:45 Altego?! Baltego?! What's the tool? Trying to scan our API to find out if there are any vulnerabilities.

  • @StuxNETozor
    @StuxNETozor 5 лет назад +3

    Let's go deeper and user Python / Ruby and do it with libraries, it's time to level up

  • @mohsintahir8906
    @mohsintahir8906 4 года назад

    can u tell me which linux u r using what type of linux system is best for find secure web kali , ubuntu or mac many people confusion on this i like ubuntu bcz its interface is beautiful but most ceh use kali or some red hat(tell me about your suggestions)

    • @alephanull1953
      @alephanull1953 4 года назад

      Kali linux or Parrot Security OS, you CAN use Ubuntu but Mali Linux has the tools you need to hack.

  • @nanayawoffeiafari
    @nanayawoffeiafari 2 года назад

    Excellent procedure but text are too small and not making the video interesting. Can you increase the text size a bit?

  • @minigeos
    @minigeos Год назад

    very well explained

  • @dukewilson1970
    @dukewilson1970 5 лет назад

    Please kindly make a video series on shodan @Null Byte

  • @yareyaredacat9943
    @yareyaredacat9943 4 года назад +3

    $1000 to anyone who can beat him in a staring contest

  • @thuggy67
    @thuggy67 4 года назад

    I might be slow or blind but where did you scan for vulnerability eg. website.com ?

  • @glotiggy5328
    @glotiggy5328 3 года назад +1

    Who try to make this money together

  • @ajcarlo9992
    @ajcarlo9992 3 года назад

    u look like Jake Gyllenhaal in the nightcrawler movie, and bobby fischer all in one

  • @Virlo
    @Virlo 5 лет назад +1

    How do you hack a phone only with the phone number, how can you listen to people calls with a program and see where they are exactly. I saw that they can find you, and listen to you through your phone, even when your phone is offline etc. How?

  • @mohsintahir8906
    @mohsintahir8906 4 года назад

    10:35 u r using mac ? what is best for other intel pcs

  • @paulmorrey733
    @paulmorrey733 5 лет назад +1

    Thanks

  • @ruinedeco3526
    @ruinedeco3526 4 года назад +1

    Tells me I shouldn’t do it on my ip at the end of the video after I’ve already done it 😂😂💀

    • @NullByteWHT
      @NullByteWHT  4 года назад +3

      Oooppss

    • @quasa0
      @quasa0 4 года назад

      @@NullByteWHT ahahahahahahahha

    • @quasa0
      @quasa0 4 года назад

      @@NullByteWHT literally the same, but started trying it on my own websites ;P

  • @rchilro
    @rchilro 5 лет назад +3

    Use bigger fonts!!!

  • @kearala7
    @kearala7 5 лет назад

    I found sql vuulnerabilty ,,will you help me in, how to search for suitable metasploit exploit for that..

  • @mocheford
    @mocheford 5 лет назад +3

    thanks again, sempai

  • @JonMartins
    @JonMartins 4 года назад

    Is that actually a macbook or a dell with hackintosh or virtual machine?

  • @mohsintahir8906
    @mohsintahir8906 4 года назад

    i am using unity tweak tool i can just switch on windows only like in one window i can watch a video and it is playing but on the other i open a text based app or terminal etc how i can write there i am unable to write i want to use both what i do?

  • @scarytruths01
    @scarytruths01 2 года назад

    Hm.. I have nord vpn but for some reason every time I log into it my internet doesn't work so iv been using mainly proxychains as a backup.

  • @bootlegronin5082
    @bootlegronin5082 3 года назад

    NullByte how do I pair it with the exploit since msf+ isn't an option on my kali machine running kali 2020

  • @McnightStricker
    @McnightStricker 5 лет назад

    thank you man this was good

  • @francescopresta9570
    @francescopresta9570 5 лет назад

    Very good job

  • @harrydamour7564
    @harrydamour7564 5 лет назад +2

    My friend 🙋‍♂️

  • @papijelly
    @papijelly Год назад +1

    This is great thank you. Im building the txt file so nikto can scan all the ip's by runing it againts the file. i only put one ip in there so make it faster but when i run nikto againt the file knito -h testip.txt it just says 0 hosts tested. But if i run nikto -h x.x.x.x it works. anyone having the same issue?

  • @Blacknova147
    @Blacknova147 4 года назад

    When I try to output the log to metasploit using '-Format msf+' kali linux spits back an error saying it's an invalid output format

  • @youbeenkumjarjaron
    @youbeenkumjarjaron 10 месяцев назад

    very good video

  • @afzalthaivalikakkath4263
    @afzalthaivalikakkath4263 5 лет назад

    Hai, bud
    Do one carding vedio and tools used

  • @Ad9911io
    @Ad9911io 5 лет назад

    Great vid
    Whats the intro music?

  • @HowToDoCrazyStuff00
    @HowToDoCrazyStuff00 5 лет назад +4

    Whats your favorite VPN?

  • @Faizy_Ahmad
    @Faizy_Ahmad 3 года назад

    The Hacker that doesn't use RGB 💓

  • @timothyschuebel5367
    @timothyschuebel5367 5 лет назад +1

    Thanks!

  • @liamtwine2267
    @liamtwine2267 2 года назад

    Why don't you make videos anymore

  • @barkieboys646
    @barkieboys646 5 лет назад

    What do you suggest me to do get an alfa adapter or an wifi pineapple nano?

    • @barkieboys646
      @barkieboys646 5 лет назад

      Lolzzn12 Please don’t react when you have no knowledge ...

    • @barkieboys646
      @barkieboys646 5 лет назад

      Both are capable of monitor mode and package injection , both are able to start an evil twin attack , both can deauthenticate networks , but the pineapple nano got a better UI and is able to run many modules when the rogue acces point is online. It also has a better range. The only thing that stops me from buying the nano is money ...

  • @cyberghost8734
    @cyberghost8734 5 лет назад

    Why did u pill all your stickers it look so cool

    • @NullByteWHT
      @NullByteWHT  5 лет назад

      They are there, under a black case

    • @cyberghost8734
      @cyberghost8734 5 лет назад

      @@NullByteWHT can't see them so no point. Do u acknowledge that any one can access to other Facebook account by recycling the yahoo account used in there profile that requires zero skill and you haven't made video about that that's very serious matter and you should make a video abt that and inform your users about that cus billions of accounts are vulnerable to it tnx

  • @PhotohackLovers
    @PhotohackLovers 2 года назад

    null byte never blinks, I'm hear for it.

  • @luckycomputers4273
    @luckycomputers4273 4 года назад +1

    not visible clearly, too small display

  • @maryamfarnegin1647
    @maryamfarnegin1647 3 года назад

    thanks a lot

  • @dusantoda
    @dusantoda 4 года назад

    Is it illegal to run nikto on websites?

  • @spacebartoloud
    @spacebartoloud 5 лет назад +1

    I have an idea what nikto possibly does, but I am expecting to see way more. (I know certain versions of html/java/flash etc have known vulnerabilities/exploits that can be used to gain access to a place they don't belong.) - I also suspect it may tell us if it might be vulnerable to a ddos attack, etc.
    I could probably use google and figure out what to do with each information, but I wouldn't use that information to attack the website, I may have told someone (RESPONSIBLE) about it, but boy can it be hard to get a hold of certain companies, let alone get them to listen that their is an issue that is absolutely worth correcting. xD
    I am now trying to pursue a security+ cert, albeit I am still a long ways from completing it, and even then there will be things I don't know, besides there are always new exploits coming out, if a black hat hacker is aware of a vulnerability before a white hat hacker is, that could be all the window of opportunity that the black hat needs to reek havoc.

  • @uniqueinsanvlog
    @uniqueinsanvlog 10 месяцев назад

    I got error... Invalid IP????

  • @netbin
    @netbin 5 лет назад

    hey null byte is there a way to run this scan way more faster? its taking such insane amount of time to finish it.

    • @DoorThief
      @DoorThief 5 лет назад

      I'm sure there are filtering options that will speed it up. Also limiting the IP range.

  • @sasukeuchiha-gs7hd
    @sasukeuchiha-gs7hd 5 лет назад

    Hi i did like the video but i had to stop it hundred of times cuz of the texts they are too small thx

  • @goodtallvideo4017
    @goodtallvideo4017 5 лет назад

    your the best man

  • @dorsetdroneguy5804
    @dorsetdroneguy5804 4 года назад

    So it’s an nmap video!

  • @TheOmarBH
    @TheOmarBH 5 лет назад

    It works on WAN?

  • @chankherpool2649
    @chankherpool2649 4 года назад

    white hacker: show them on RUclips
    gray hacker: …..
    black hacker: any one know about them???????????????

    • @PhotohackLovers
      @PhotohackLovers 2 года назад

      torrents my friend, if you know where to look.

  • @bornabujanic7575
    @bornabujanic7575 5 лет назад +1

    Hi again!

  • @blakebarbee7224
    @blakebarbee7224 5 лет назад

    Oh wow this is so cool.

  • @maxpowers4762
    @maxpowers4762 4 года назад

    WTF are those straight lines in the command for saving the nullbyte.txt file to targetip.txt? i don't have such characters on my keyboard. And where and how does this command work? I just wasted an hour of my life trying to figure out this command.

  • @botmusics4875
    @botmusics4875 3 года назад

    Really sorry, But please could you zoom your terminak while typing something.

  • @theazza
    @theazza 3 года назад

    Null Byte s’helpful.

  • @ganeshcilpa8214
    @ganeshcilpa8214 4 года назад

    whats the cmd for windows to install

  • @bennypablodre7977
    @bennypablodre7977 3 года назад

    I need to learn 😩

  • @shadowsblack3896
    @shadowsblack3896 5 лет назад

    Muy pequeño lo que se escribe en la terminal. No se alcanza a ver bien.

  • @JohnSmith-uh4eu
    @JohnSmith-uh4eu 5 лет назад

    Screencasters do not use a font this small

  • @dolakt62
    @dolakt62 3 года назад

    How can i bypass an admin login page using kali linux