Paper , Order, or Assignment Requirements
Using Nikto, scan a vulnerable web server on a virtual machine. Then, run a scan using W3AF against the same virtual machine. (Review Chapter 6 for more information about Nikito and W3AF.)
Take a screen shot of your results.
Analyze the results, and develop the conclusions, recommendations and implications. Be sure to site any outside sources used in APA format.
Include your analysis of results and screenshots in a Word document to submit for grading.