Scan for Vulnerabilities on Any Website Using Nikto [Tutorial]

March 13, 2019 by 44 Comments



Get Our Premium Ethical Hacking Bundle (90% Off): https://nulb.app/cwlshop

How to Scan Websites for Vulnerabilities with Nikto
Full Tutorial: http://bit.ly/NiktoScan
Subscribe to Null Byte: https://goo.gl/J6wEnH
Kody’s Twitter: https://twitter.com/KodyKinzie

Not all websites are developed the same, and a lack of security measures is all the opening a hacker needs to wreak some havoc. In this episode of Cyber Weapons Lab, we’ll show you how to scan websites for vulnerabilities with Nikto, a powerful but simple tool that can perform scans on SSL/HTTPS websites, an IP address for a service on a local network, or an older HTTP web domain.

Follow Null Byte on:
Twitter: https://twitter.com/nullbytewht
Flipboard: https://flip.it/3.Gf_0
Weekly newsletter: https://eepurl.com/dE3Ovb

source

44 Replies to “Scan for Vulnerabilities on Any Website Using Nikto [Tutorial]”

  1. Nikhil Reddy says:

    Why nikto -h code is showing invalid ip error Please answer

  2. Soft Company says:

    How to scan .bazar domain?

  3. A .S says:

    Wait for me google, and prepare to be hacked.🧼

  4. Folgen Dhego says:

    the best BLINK all the time 1:82

  5. zac morris says:

    I might be slow or blind but where did you scan for vulnerability eg. website.com ?

  6. Linux Jedi says:

    Important question, would OSINT tools work on Ubuntu LTS?

  7. Don Turra says:

    That electric sound effect at the end of the video – you got me. I even felt the vibration coming from my laptop. Fuck sake.

  8. Avci Beats says:

    skickar$ command not found, what to do?

  9. not visible clearly, too small display

  10. Please increase the terminal font

  11. DEMON says:

    Bruh this man is good at what he does but does he very fucking blink

  12. Qui86 says:

    Blink once, you snake bastard, noob.

  13. Max Powers says:

    WTF are those straight lines in the command for saving the nullbyte.txt file to targetip.txt? i don't have such characters on my keyboard. And where and how does this command work? I just wasted an hour of my life trying to figure out this command.

  14. Onion s says:

    Can we use this in Bug bounty?

  15. Mohie Ali says:

    You are very good presenter, but , this time, you are NOT, the video is very good if
    we can see what is written on the screen!!!!!!!!!!!!!
    You may choose to change the background color from black to white and writing color from green to black.
    Or, the bar minimum ; zoom in !!!!!!!!!!!!!!!!! so, we can, what is written there and follow what you are saying !!!!!!!!!!!!!!!!!

  16. Just wanted to say thank you for your channel 👍I appreciate your presentations

  17. Ganesh Cilpa says:

    whats the cmd for windows to install

  18. Hi sir
    Please tell me
    How to hack or edit games like a free fire,pubg,mpl,etc
    With the help of html language & server side scripting & client side scripting
    Please answer me sir please…

  19. Adhnan Jafar says:

    $1000 to anyone who can beat him in a staring contest

  20. Maverick S. says:

    sir @Null Byte do you hack with your mac OS terminal or use a VM?

  21. Fudo Shin says:

    I done this using a VPN and used my Linux server on Hyper V manager! Love your videos!!!

  22. better to find Vulnerabilities on your own web site /

  23. i like that sepread this just for knowledge purpose

  24. can u tell me which linux u r using what type of linux system is best for find secure web kali , ubuntu or mac many people confusion on this i like ubuntu bcz its interface is beautiful but most ceh use kali or some red hat(tell me about your suggestions)

  25. i am using unity tweak tool i can just switch on windows only like in one window i can watch a video and it is playing but on the other i open a text based app or terminal etc how i can write there i am unable to write i want to use both what i do?

  26. 10:35 u r using mac ? what is best for other intel pcs

  27. So it’s an nmap video!

  28. How I can write the stray up lines in the terminal? | awk '/Up$/{print $2}' |

  29. Is it illegal to run nikto on websites?

  30. Jon Martins says:

    Is that actually a macbook or a dell with hackintosh or virtual machine?

  31. Blacknova147 says:

    When I try to output the log to metasploit using '-Format msf+' kali linux spits back an error saying it's an invalid output format

  32. F R says:

    look at his left eye, once you notice the eye twitch you won't ever unsee it

  33. I want read results idk where and how

  34. A3logics says:

    Hi, I am Scarlett from A3logics. I want to collaborate over Youtube. Please share your email. So I can share exact details.

  35. Jordan Tangy says:

    Hey really nice !
    Do you know how to bypass firewalls ? For some reason, -sS flag doesnt work when the network is set up with firewall or antivirus

  36. Jeff Poague says:

    Thanks for the info man!! No puns here.

  37. white hacker: show them on YouTube
    gray hacker: …..
    black hacker: any one know about them???????????????

  38. Aditya Gupta says:

    If you want to learn hacking come to null bytes…

Leave a Comment

Your email address will not be published. Required fields are marked *