Security Scanning Tools
Master Security Scanning and Vulnerability Assessment
Security professionals need comprehensive guidance on industry-standard scanning tools. This skill provides structured documentation for network discovery, vulnerability assessment, and compliance auditing with proper authorization frameworks.
下載技能 ZIP
在 Claude 中上傳
前往 設定 → 功能 → 技能 → 上傳技能
開啟並開始使用
測試它
正在使用「Security Scanning Tools」。 Perform a quick network scan of 192.168.1.0/24
預期結果:
Nmap scan report showing discovered hosts, open ports (22/SSH, 80/HTTP, 443/HTTPS), service versions, and OS detection results with timing information.
正在使用「Security Scanning Tools」。 Scan web application for SQL injection vulnerabilities
預期結果:
Burp Suite Scanner report listing identified SQL injection points with severity ratings, affected parameters, and remediation recommendations for each finding.
安全審計
低風險This skill provides educational documentation for legitimate security assessment tools. Static analyzer flagged 184 patterns but nearly all are FALSE POSITIVES: backtick detections are markdown code blocks (```bash), sudo commands are standard tool prerequisites, and IPs are RFC 1918 examples. The skill includes proper authorization warnings and legal considerations. Metasploit is documented for vulnerability validation in authorized contexts only.
高風險問題 (1)
低風險問題 (2)
風險因素
⚙️ 外部命令 (1)
🌐 網路存取 (1)
品質評分
你能建構什麼
Network Security Assessment
Security analysts performing authorized network audits can use this skill to select appropriate scanning tools, configure scan parameters, and interpret results for vulnerability reports.
Penetration Testing Engagement
Penetration testers conducting authorized assessments can reference tool selection guidance, scanning methodologies, and reporting templates for client engagements.
Compliance Audit Preparation
IT auditors and compliance officers can use the compliance scanning sections to validate systems against PCI-DSS, HIPAA, and CIS benchmark requirements.
試試這些提示
Show me how to perform a basic network discovery scan using Nmap for the subnet 192.168.1.0/24, including host discovery and common port enumeration.
I need to assess a web application at https://example.com for OWASP Top 10 vulnerabilities. What tools should I use and what is the recommended scanning workflow?
My Nessus scan identified potential SMB vulnerabilities. How can I use Metasploit to safely validate these findings in an authorized engagement?
I need to perform a comprehensive AWS security assessment covering IAM, S3, and EC2 configurations. What Prowler commands should I run and how do I interpret the compliance results?
最佳實務
- Always obtain written authorization before scanning any systems you do not own
- Start with passive reconnaissance and non-intrusive scans before escalating to active testing
- Document all scanning activities including scope, tools used, and findings for client reporting
避免
- Scanning production systems without explicit written authorization from system owners
- Running aggressive scans (T5 timing, full port ranges) on critical infrastructure without impact assessment
- Reporting automated scanner results without manual validation to eliminate false positives
常見問題
Do I need special permissions to use these security scanning tools?
Which tool should I use for my first security assessment?
Can these tools damage the systems I scan?
How do I reduce false positives in vulnerability scans?
What is the difference between passive and active scanning?
Are these tools legal to install and learn?
開發者詳情
作者
zebbern授權
MIT
儲存庫
https://github.com/sickn33/antigravity-awesome-skills/tree/main/web-app/public/skills/scanning-tools引用
main
檔案結構
📄 SKILL.md