How to Install and Use Nikto

Nikto is one of the open source utilities that is broadly utilized by Pentesters for quick and automated web application vulnerability scanning. Nikto has the ability to detect possibly fascinating threats by referencing the robots.txt file, by spidering the outside of the application, and by going through a rundown of known documents that might contain interesting data.

Nikto performs more than 6700 tests against a site. The vast number of tests for both security vulnerabilities and mis-configured web servers makes it a go to device for most of the security experts and pentesters. Nikto can be used to test a Web Site and Web Server or a Virtual Host for known security vulnerabilities and mis-configurations of files, programs and servers. It can discover overlooked contents or scripts and other difficult to identify issues from an outside point of view.


Installing Nikto on Ubuntu system is basically straightforward as the package is already accessible on the default repositories.

First to update the system repositories we will use the following command :

[email protected]:~$ sudo apt-get update && sudo apt-get upgrade

After updating your system. Now Run the following command to Install Nikto.

[email protected]:~$ sudo apt-get install nikto -y

After the completion of installation process ,use the following command to check if nikto is installed correctly or not :

[email protected]:~$ nikto
- Nikto v2.1.6

If the command gives the version number of Nikto it means installation is successful.


Now we are going to see how we can use Nikto with various command line options to perform web scanning.

Generally Nikto requires just an host to scan which can be specified with -h or -host option for example if we need to scan a machine whose ip is we will run Nikto as follows and the scan would look something like this:

[email protected]:~$ nikto -h
- Nikto v2.1.6
+ Target IP:
+ Target Hostname:
+ Target Port: 80
+ Start Time: 2020-04-11 10:01:45 (GMT0)
+ Server: nginx/1.14.0 (Ubuntu)
+ /: A Wordpress installation was found.
+ /wp-login.php: Wordpress login found
+ Apache/2.4.10 appears to be outdated
+ The X-XSS-Protection header is not defined. This header can hint to the user agent
 to protect against some forms of XSS
+ Server may leak inodes via ETags
+ 1 host(s) tested

This output has a lot of useful information .Nikto has detected the Webserver, XSS vulnerabilities, Php information and WordPress installation.


The items in a nikto scan with OSVDB prefix are the vulnerabilities that are reported in Open Source Vulnerability DataBase (similar to other vulnerability databases such as Common vulnerabilities and exposures, National Vulnerability Database etc).These can come in quite handy based on their severity score ,

Specifying Ports

As you can see from above results, when the port is not specified Nikto will scan port 80 by default . If the web server is running on a different port, you have to specify the port number by using -p or –port option.

[email protected]:~$ nikto -h -p 65535
- Nikto v2.1.6
+ Target IP:
+ Target Hostname:
+ Target Port: 65535
+ Start Time: 2020-04-11 10:57:42 (GMT0)
+ Server: Apache/2.4.29 (Ubuntu)
+ The anti-clickjacking X-Frame-Options header is not present.
+ Apache/2.4.29 appears to be outdated
+ OSVDB-3233: /icons/README: Apache default file found.
+ Allowed HTTP Methods: OPTIONS, HEAD, GET, POST
1 host scanned...

From the above information we can see that there are some headers that help indicate how the website is configured. You can get some juicy information from secret directories too.

You can specify multiple ports by using comma like:

[email protected]:~$ nikto -h -p 65535,65536

Or you can specify a range of ports like:

[email protected]:~$ nikto -h -p 65535-65545

Using URLs to specify a target host

To specify the target by its URL we will use a command :

[email protected]:~$ nikto -h http://

Nikto scan results can be exported in different formats like CSV, HTML, XML etc. To save results in a specific output format, you need to specify the -o (output) option and also the -f (format) option.

Example :

[email protected]:~$ nikto -h -o test.html -F html

Now we can access the report via browser

Tuning parameter

Another decent component in Nikto is the likelihood to characterize the test utilizing the – Tuning parameter. This will let you run just the tests you need which can spare you a great deal of time:

  1. File upload
  2. Interesting files/logs
  3. Mis-configurations
  4. Information disclosure
  5. Injection(XSS etc)
  6. Remote file retrieval
  7. Denial of service (DOS)
  8. Remote file retrieval
  9. Remote shell – Command execution
  10. SQL Injection
  11. Authentication Bypass
  12. Software identification
  13. Remote source inclusion
  14. Reverse tuning execution (all except specified)

For example to test for SQL injection and Remote file retrieval we will write following command :

[email protected]:~$ nikto -h -Tuning 79 -o test.html -F html

Pairing scans with Metasploit

One of the coolest things about Nikto is that you can pair the output of a scan with Metasploit readable format. By doing this you can use the output of Nikto in Metasploit to exploit the particular vulnerability. To do so, just use above commands and append -Format msf+ to the end. It will help quickly pair data retrieved with a weaponized exploit.

[email protected]:~$ nikto -h <hostname> -Format msf+


Nikto is a famous and simple to utilize web server assessment tool to discover potential issues and vulnerabilities rapidly. Nikto ought to be your first decision when pen testing web servers and web applications. Nikto is filtering for 6700 possibly risky documents/programs, checks for obsolete forms of more than 1250 servers, and adapts explicit issues on more than 270 servers as indicated by the authority Nikto site. You should know that using nikto isn’t a stealthy procedure means that an Intrusion Detection System can easily detect it. It was made for security analysis, so stealth was never a priority.

About the author

Usama Azad

Usama Azad

A security enthusiast who loves Terminal and Open Source. My area of expertise is Python, Linux (Debian), Bash, Penetration testing, and Firewalls. I’m born and raised in Wazirabad, Pakistan and currently doing Undergraduation from National University of Science and Technology (NUST). On Twitter i go by @UsamaAzad14