Habilidades webapp-nikto
🛡️

webapp-nikto

Baixo Risco ⚙️ Comandos externos🌐 Acesso à rede🔑 Variáveis de ambiente

Scan web servers for vulnerabilities with Nikto

Nikto is an open-source web server scanner that identifies dangerous files, outdated software versions, and server misconfigurations. Use this skill to conduct authorized security assessments and compliance scans against web servers and applications.

Suporta: Claude Codex Code(CC)
🥉 74 Bronze
1

Baixar o ZIP da skill

2

Upload no Claude

Vá em Configurações → Capacidades → Skills → Upload skill

3

Ative e comece a usar

Testar

A utilizar "webapp-nikto". Scan http://testserver.local for common web vulnerabilities

Resultado esperado:

  • Nikto scan completed successfully
  • Findings Summary: Critical: 0 | High: 2 | Medium: 5 | Low: 3
  • Key Findings: /admin/: Directory indexing found, /server-status: Apache server-status exposed, PHP version 7.4.3 detected (outdated)
  • Recommendations: Disable server-status endpoint, Update PHP to version 8.1+, Restrict /admin/ access

A utilizar "webapp-nikto". Run an SSL security assessment on https://api.example.com

Resultado esperado:

  • SSL/TLS assessment completed
  • Certificate Details: Issuer: DigiCert, Valid until: 2025-12-31
  • SSL Findings: TLS 1.0 supported (deprecated), Weak cipher suite detected: TLS_RSA_WITH_AES_128_CBC_SHA
  • Recommendations: Disable TLS 1.0 and 1.1, Upgrade to TLS 1.3, Remove weak cipher suites

Auditoria de Segurança

Baixo Risco
v5 • 1/16/2026

Documentation-only skill providing guidance for the Nikto open-source web server scanner. All code examples are shell commands for the external Nikto tool which users install and run separately. Contains no executable scripts. Includes explicit authorization requirements and ethical usage guidelines. The static findings (external commands, network URLs, security vocabulary) are expected documentation content for a vulnerability scanning skill, not malicious patterns.

6
Arquivos analisados
2,216
Linhas analisadas
4
achados
5
Total de auditorias
Problemas de Baixo Risco (1)
Documentation describes security scanning capabilities
The skill documentation includes examples of Nikto scanning commands that interact with external web servers. These are documented usage instructions for a legitimate open-source security tool. Includes explicit authorization requirements and ethical usage guidelines.

Fatores de risco

⚙️ Comandos externos (1)
🌐 Acesso à rede (1)
🔑 Variáveis de ambiente (1)
Auditado por: claude Ver Histórico de Auditoria →

Pontuação de qualidade

55
Arquitetura
100
Manutenibilidade
85
Conteúdo
30
Comunidade
88
Segurança
100
Conformidade com especificações

O Que Você Pode Construir

Authorized penetration testing

Conduct comprehensive web server security assessments for clients with proper authorization documentation

Compliance vulnerability scans

Scan internal web applications to verify security controls meet PCI-DSS and OWASP requirements

Internal security hardening

Identify and remediate web server misconfigurations in pre-production environments

Tente Estes Prompts

Basic scan
Run a Nikto scan against http://example.com and output results to a text file
SSL assessment
Perform an SSL-focused Nikto scan on https://secure.example.com with detailed SSL checks
Authenticated scan
Run an authenticated Nikto scan against http://internalapp.local using credentials admin:password123
Compliance report
Scan web1.example.com and web2.example.com, generate an HTML compliance report with vulnerability classifications

Melhores Práticas

  • Always obtain written authorization before scanning any system
  • Schedule scans during maintenance windows to minimize production impact
  • Document all findings with remediation steps for compliance reporting

Evitar

  • Scanning systems without documented authorization
  • Running full scans on production systems during business hours
  • Ignoring false positive verification before reporting

Perguntas Frequentes

Is Nikto installed by default?
No. Nikto is a Perl-based tool that must be installed separately. Install via package manager (apt install nikto) or from source at cirt.net.
What authorization do I need?
You need written authorization from the system owner that explicitly covers web server vulnerability scanning and specifies target scope.
Does this skill run scans automatically?
No. This skill provides documentation and command templates. Users must run nikto commands directly after installing the tool.
Is my scan data stored or transmitted?
All scan results are saved locally to files you specify. No data is transmitted to external servers by this skill.
Why does Nikto trigger so many alerts?
Nikto tests for thousands of known vulnerabilities and uses simple pattern matching, causing false positives. Always verify findings manually.
How does Nikto compare to other scanners?
Nikto is fast and comprehensive for server-level issues but does not analyze application logic. Combine with tools like ZAP or Burp for complete coverage.

Detalhes do Desenvolvedor