Website Vulnerability Scanner Report (Light)
Get a PRO Account to unlock the FULL capabilities of this scanner
See wh at th e FULL scan n er can d o
Perform in-depth website scanning and discover high risk vulnerabilities.
Testi n g areas Li gh t scan Fu l l scan
Website fingerprinting
Version-based vulnerability detection
Common configuration issues
SQL injection
Cross-Site Scripting
Local/Remote File Inclusion
Remote command execution
Discovery of sensitive files
https://www.facebook.com/sopno.heinbalok
Summary
Ov erall risk lev el: Risk rat ings: Scan informat ion:
L ow High: 0 Start time: 2020-06-11 12:39:02 UTC+03
Medium: 0 Finish time: 2020-06-11 12:39:25 UTC+03
Low: 2 Scan duration: 23 sec
Info: 8 Tests performed: 10/10
Scan status: Finished
Findings
Robots.txt file found
https://www.facebook.com/robots.txt
Details
Ris k de s c ription:
There is no particular security risk in having a robots.txt file. However, this file is often misused to try to hide some web pages from the users.
This should not be done as a security measure because these URLs can easily be read from the robots.txt file.
Re c omme nda tion:
We recommend you to remove the entries from robots.txt which lead to sensitive locations in the website (ex. administration panels,
configuration files, etc).
More information about this issue:
https://www.theregister.co.uk/2015/05/19/robotstxt/
Password auto-complete is enabled
1/3
<input class="inputtext login_form_input_box" data-testid="royal_pass" id="pass" name="pass" type="password"/>
Details
Ris k de s c ription:
When password auto-complete is enabled, the browser will remember the password entered into the login form, such that it will automatically
fill it next time the user tries to login.
However, if an attacker gains physical access to the victim's computer, he can retrieve the saved password from the browser's memory and use
it to gain access to the victim's account in the application.
Furthermore, if the application is also vulnerable to Cross-Site Scripting, the attacker could steal the saved password remotely.
Re c omme nda tion:
We recommend you to disable the password auto-complete feature on the login forms by setting the attribute autocomplete="off" on all
password fields.
More information about this issue:
https://owasp.org/www-project-web-security-testing-guide/stable/4-Web_Application_Security_Testing/04-Authentication_Testing/05-
Testing_for_Vulnerable_Remember_Password.html.
Server software and technology not found
No vulnerabilities found for server-side software (missing version information)
No security issue found regarding HTTP cookies
HTTP security headers are properly configured
Communication is secure
No security issue found regarding client access policies
Directory listing not found (quick scan)
Passwords are submitted over an encrypted channel
2/3
Scan coverage information
List of tests performed (10/ 10)
Fingerprinting the server software and technology...
Checking for vulnerabilities of server-side software...
Analyzing the security of HTTP cookies...
Analyzing HTTP security headers...
Checking for secure communication...
Checking robots.txt file...
Checking client access policies...
Checking for directory listing (quick scan)...
Checking for password auto-complete (quick scan)...
Checking for clear-text submission of passwords (quick scan)...
Scan parameters
Website URL: https://www.facebook.com/sopno.heinbalok
Scan type: Light
Authentication: False
3/3