The Nikto report shows that the HTTP TRACE method is enabled (OSVDB-877). TRACE can be abused in cross-site tracing (XST) attacks to steal authentication cookies or other sensitive headers, so disabling TRACE removes the underlying vulnerability. Upgrading Apache, hiding version strings, or limiting access to /admin/ may be good security hygiene, but they do not address the specific high-risk issue highlighted in the scan.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What kind of vulnerabilities does Nikto detect?
Open an interactive chat with Bash
Can Nikto be used to scan HTTPS sites, or is it limited to HTTP?
Open an interactive chat with Bash
How does Nikto compare to other web vulnerability scanners like Burp Suite?