Nikto
Open-source web server scanner that checks for dangerous files, outdated software, and misconfigurations across 6,700+ known vulnerability signatures.
Developer
Chris Sullo
description Technical Dossier
Nikto is a command-line web server vulnerability scanner that has been a staple of penetration testing toolkits since its initial release in 2001. It operates by sending a large battery of HTTP requests to a target server and comparing responses against a maintained database of known dangerous files, outdated software signatures, and misconfiguration patterns. A single scan can surface exposed administrative interfaces, default credentials pages, old CGI scripts, directory listing disclosures, HTTP method permissiveness, missing security headers, and server version banners that reveal patch-level weaknesses.
The scanner’s architecture is plugin-based and written in Perl, making it lightweight and highly portable. Its scan logic is tunable via category flags, allowing testers to focus on specific vulnerability classes — such as injection points, file uploads, authentication issues, or information disclosure — rather than running the full test suite. Nikto supports authenticated scans using HTTP Basic and NTLM credentials, can route traffic through HTTP proxies, handles cookies automatically, and operates over both IPv4 and IPv6. Built-in evasion modes allow testers to probe targets while simulating attempts to bypass intrusion detection systems.
What makes Nikto notable is its longevity, breadth of checks, and no-frills utility. It is not a deep application-layer scanner in the manner of a DAST proxy tool; rather, it excels at fast, broad server-level enumeration and is frequently the first scanner run against a new target in an assessment. It ships pre-installed in Kali Linux and is referenced by CISA as a legitimate security testing resource. Nikto remains one of the most efficient tools for quickly identifying low-hanging server misconfigurations before moving into deeper application testing.
search Comprehensive Vulnerability Database
Checks against 6,700+ known dangerous files and CGIs, outdated versions of 1,250+ server types, and version-specific issues across 270+ servers.
lock SSL/TLS Analysis
Scans HTTPS services for expired certificates, insecure cipher configurations, and known TLS-layer vulnerabilities alongside standard HTTP checks.
shield IDS Evasion Techniques
Multiple evasion methods including random URI encoding, directory self-referencing, TAB substitution, and case randomization to bypass pattern-matching defenses.
description Flexible Reporting
Produces reports in plain text, CSV, JSON, XML, HTML, and SQL formats with direct database output support for integration into security pipelines.
Distribution Model
Open Source
Free community edition available.
Enterprise support on request.

Vulnerability Checks
6,700+
Server Signatures
1,250+
Language
PERL
License
GPL V2