Nikto

Open-source web server scanner that checks for dangerous files, outdated software, and misconfigurations across 6,700+ known vulnerability signatures.

Developer

Chris Sullo

verified_user
Visit Official Site open_in_new

description Technical Dossier

Nikto is a command-line web server vulnerability scanner that has been a staple of penetration testing toolkits since its initial release in 2001. It operates by sending a large battery of HTTP requests to a target server and comparing responses against a maintained database of known dangerous files, outdated software signatures, and misconfiguration patterns. A single scan can surface exposed administrative interfaces, default credentials pages, old CGI scripts, directory listing disclosures, HTTP method permissiveness, missing security headers, and server version banners that reveal patch-level weaknesses.

The scanner’s architecture is plugin-based and written in Perl, making it lightweight and highly portable. Its scan logic is tunable via category flags, allowing testers to focus on specific vulnerability classes — such as injection points, file uploads, authentication issues, or information disclosure — rather than running the full test suite. Nikto supports authenticated scans using HTTP Basic and NTLM credentials, can route traffic through HTTP proxies, handles cookies automatically, and operates over both IPv4 and IPv6. Built-in evasion modes allow testers to probe targets while simulating attempts to bypass intrusion detection systems.

What makes Nikto notable is its longevity, breadth of checks, and no-frills utility. It is not a deep application-layer scanner in the manner of a DAST proxy tool; rather, it excels at fast, broad server-level enumeration and is frequently the first scanner run against a new target in an assessment. It ships pre-installed in Kali Linux and is referenced by CISA as a legitimate security testing resource. Nikto remains one of the most efficient tools for quickly identifying low-hanging server misconfigurations before moving into deeper application testing.

search Comprehensive Vulnerability Database

Checks against 6,700+ known dangerous files and CGIs, outdated versions of 1,250+ server types, and version-specific issues across 270+ servers.

lock SSL/TLS Analysis

Scans HTTPS services for expired certificates, insecure cipher configurations, and known TLS-layer vulnerabilities alongside standard HTTP checks.

shield IDS Evasion Techniques

Multiple evasion methods including random URI encoding, directory self-referencing, TAB substitution, and case randomization to bypass pattern-matching defenses.

description Flexible Reporting

Produces reports in plain text, CSV, JSON, XML, HTML, and SQL formats with direct database output support for integration into security pipelines.

Distribution Model

Open Source

Free community edition available.
Enterprise support on request.

trending_up Popularity

Low 55 / 100 High

settings_suggest Deployment Complexity

Low 15 / 100 High

engineering Technical Difficulty

Low 30 / 100 High
Nikto visualization
radar

Vulnerability Checks

6,700+

Server Signatures

1,250+

Language

PERL

License

GPL V2