SushantMohan Project3
SushantMohan Project3
Prerequisites:
1. Install Nmap: Ensure you have Nmap installed on your system. You can download and install
it from Nmap official website.
3. Permission: Ensure you have permission to scan the website. Unauthorized scanning can
be illegal and is considered unethical.
4. Tools: You may want to use tools like Nmap (for enumeration and vulnerability scanning)
and Nikto (for web vulnerability scanning).
1. Identify the Target: The target URL for this task is http://zero.webappsecurity.com/. For Nmap
to work effectively, you may want to first resolve the domain name to an IP address.
nslookup zero.webappsecurity.com
2. Basic Nmap Scan (Open Ports): Start with a basic Nmap scan to identify open ports on the
target server.
nmap zero.webappsecurity.com
3. Service and Version Detection: To gather more information about the services running on
the open ports, use the -sV option to detect versions.
4. Operating System Detection: To get information about the underlying operating system, you
can use the -O option.
nmap -O zero.webappsecurity.com
5. Aggressive Scan (Combines multiple options): Run a more aggressive scan with service
version detection, OS detection, and script scanning.
# Aggressive scan
nmap -A zero.webappsecurity.com
6. Output the Scan Results to a File: Save the output of your scan into a file for
Now, let's perform a web vulnerability scan using Nikto. This will help identify any potential
vulnerabilities within the web application itself.
vulnerabilities nikto -h
http://zero.webappsecurity.com/
This will look for vulnerabilities like SQL injection, cross-site scripting (XSS), and server misconfigurations.
1. Review Nmap Output: Look at the results of the Nmap scan to gather information about
the open ports, services, and the operating system of the target. The -A scan provides a lot
of
detailed information, including the host details, OS version, and services running on open ports.
2. Review Nikto Output: Check the Nikto scan results to identify potential vulnerabilities such as:
1. Target Information:
Target URL: http://zero.webappsecurity.com/
Open Ports:
Service Versions:
Operating System:
Additional Information:
4. Conclusion:
Nmap Findings: The target server is running an Apache web server on Linux with no
immediate signs of firewalls or intrusion prevention systems blocking scans.