Results 1 to 4 of 4

Thread: Nikto results and 404 Share/Save - My123World.Com!

  1. #1

    Nikto results and 404

    I've scanned site with nikto and found a lot of directories and files, but when i try to reach them from browser, i've got 404 error.
    Help plz, how to bypass this?

  2. #2
    ... I am no Expert b0nd.g4h@gmail.com b0nd's Avatar
    Join Date
    Jul 2010
    Location
    irc.freenode.net #g4h
    Posts
    744
    That's page not found error. Resource shouldn't be there.
    Anyway, possible to share nikto result here?

    Cheers!
    b0nd
    [*] To follow the path: look to the master, follow the master, walk with the master, see through the master,
    ------> become the master!!! <------
    [*] Everyone has a will to WIN but very few have the will to prepare to WIN
    [*] Invest yourself in everything you do, there's fun in being serious

  3. #3
    maybe you should also try here:https://en.wikipedia.org/wiki/List_of_HTTP_status_codes

    ...as well as from the question: what you're trying to do, and what do you not understand yet.

    it should brings a lot of cool ideas and answers.

    good luck.

  4. #4
    ...
    + /forums//admin/config.php: PHP Config file may contain database IDs and passwords.
    + /forums//adm/config.php: PHP Config file may contain database IDs and passwords.
    + /forums//administrator/config.php: PHP Config file may contain database IDs and passwords.
    + /guestbook/guestbookdat: PHP-Gastebuch 1.60 Beta reveals sensitive information about its configuration.
    + /guestbook/pwd: PHP-Gastebuch 1.60 Beta reveals the md5 hash of the admin password.
    ....
    + /uploadx.asp: An ASP page that allows attackers to upload files to server
    + /wa.exe: An ASP page that allows attackers to upload files to server
    + /basilix/compose-attach.php3: BasiliX webmail application prior to 1.1.1 contains a non-descript security vulnerability in compose-attach.php3 related to attachment uploads
    + /server/: Possibly Macromedia JRun or CRX WebDAV upload
    + /vgn/ac/data: Vignette CMS admin/maintenance script available.
    + /vgn/ac/delete: Vignette CMS admin/maintenance script available.
    + /vgn/ac/edit: Vignette CMS admin/maintenance script available.
    + /vgn/ac/esave: Vignette CMS admin/maintenance script available.
    + /vgn/ac/fsave: Vignette CMS admin/maintenance script available.
    + /vgn/ac/index: Vignette CMS admin/maintenance script available.
    + /vgn/asp/MetaDataUpdate: Vignette CMS admin/maintenance script available.
    + /vgn/asp/previewer: Vignette CMS admin/maintenance script available.
    + /vgn/asp/status: Vignette CMS admin/maintenance script available.
    + /vgn/asp/style: Vignette CMS admin/maintenance script available.
    + /vgn/errors: Vignette CMS admin/maintenance script available.
    + /vgn/jsp/controller: Vignette CMS admin/maintenance script available.
    + /vgn/jsp/errorpage: Vignette CMS admin/maintenance script available.
    + /vgn/jsp/initialize: Vignette CMS admin/maintenance script available.
    + /vgn/jsp/jspstatus: Vignette CMS admin/maintenance script available.
    + /vgn/jsp/jspstatus56: Vignette CMS admin/maintenance script available.
    + /vgn/jsp/metadataupdate: Vignette CMS admin/maintenance script available.
    + /vgn/jsp/previewer: Vignette CMS admin/maintenance script available.
    + /vgn/jsp/style: Vignette CMS admin/maintenance script available.
    + /vgn/legacy/edit: Vignette CMS admin/maintenance script available.
    + /vgn/login: Vignette server may allow user enumeration based on the login attempts to this file.
    ....

    + OSVDB-578: /level/16/exec/: CISCO HTTP service allows remote execution of commands
    + OSVDB-578: /level/16/exec//show/access-lists: CISCO HTTP service allows remote execution of commands
    + OSVDB-578: /level/16/level/16/exec//show/configuration: CISCO HTTP service allows remote execution of commands
    + OSVDB-578: /level/16/level/16/exec//show/interfaces: CISCO HTTP service allows remote execution of commands
    + OSVDB-578: /level/16/level/16/exec//show/interfaces/status: CISCO HTTP service allows remote execution of commands
    + OSVDB-578: /level/16/level/16/exec//show/version: CISCO HTTP service allows remote execution of commands
    + OSVDB-578: /level/16/level/16/exec//show/running-config/interface/FastEthernet: CISCO HTTP service allows remote execution of commands
    + OSVDB-578: /level/16/exec//show: CISCO HTTP service allows remote execution of commands
    + OSVDB-578: /level/17/exec//show: CISCO HTTP service allows remote execution of commands
    + OSVDB-578: /level/18/exec//show: CISCO HTTP service allows remote execution of commands
    + OSVDB-578: /level/19/exec//show: CISCO HTTP service allows remote execution of commands
    + OSVDB-578: /level/20/exec//show: CISCO HTTP service allows remote execution of commands
    + OSVDB-578: /level/21/exec//show: CISCO HTTP service allows remote execution of commands
    + OSVDB-578: /level/22/exec//show: CISCO HTTP service allows remote execution of commands
    + OSVDB-578: /level/23/exec//show: CISCO HTTP service allows remote execution of commands
    + OSVDB-578: /level/24/exec//show: CISCO HTTP service allows remote execution of commands
    + OSVDB-578: /level/26/exec//show: CISCO HTTP service allows remote execution of commands
    + OSVDB-578: /level/27/exec//show: CISCO HTTP service allows remote execution of commands
    + OSVDB-578: /level/28/exec//show: CISCO HTTP service allows remote execution of commands
    + OSVDB-578: /level/29/exec//show: CISCO HTTP service allows remote execution of commands
    + OSVDB-578: /level/31/exec//show: CISCO HTTP service allows remote execution of commands
    + OSVDB-578: /level/32/exec//show: CISCO HTTP service allows remote execution of commands
    + OSVDB-578: /level/33/exec//show: CISCO HTTP service allows remote execution of commands

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •