| Command | Purpose |
nikto -h <target> | Basic scan of target host |
nikto -h <target> -p <port> | Scan specific port |
nikto -h <target> -p <port1,port2> | Scan multiple ports |
nikto -h <target> -p 80-443 | Scan port range |
| Option | Description |
-o <file> | Output to file |
-Format txt | Text format (default) |
-Format csv | CSV format |
-Format htm | HTML format |
-Format xml | XML format |
-Format json | JSON format |
-nossl | Disable SSL checks |
-no404 | Disable 404 checks (faster) |
| Option | Description |
-id <user:pass> | HTTP basic authentication |
-mutate 1 | Guess usernames/passwords |
-mutate 2 | Guess directory names |
-mutate 3 | Guess filenames |
-mutate 4 | Guess usernames from Apache |
-mutate 5 | Guess usernames from cgiwrap |
-mutate 6 | Guess usernames from Windows |
| Flag | Description |
-Cgidirs none | Donโt scan CGI directories |
-Cgidirs all | Scan all CGI directories |
-Display 1 | Show redirects |
-Display 2 | Show cookies received |
-Display 3 | Show all 200/404/403 responses |
-Display 4 | Show URLs requiring authentication |
-Display D | Debug output |
-Display V | Verbose output |
-Tuning 1 | Interesting files |
-Tuning 2 | Misconfigurations |
-Tuning 3 | Information disclosure |
-Tuning 4 | Injection (XSS/Script/HTML) |
-Tuning 5 | Remote file retrieval |
-Tuning 6 | Denial of service |
-Tuning 7 | Remote file execution |
-Tuning 8 | SQL injection |
-Tuning 9 | File upload |
-Tuning a | Authentication bypass |
-Tuning b | Software identification |
-Tuning c | Remote code execution |
-Tuning d | Denial of service (DoS) |
-Tuning e | Denial of service (DoS) |
-Tuning f | Fingerprinting |
-Tuning g | SQL injection |
-Tuning h | Remote file retrieval |
-Tuning i | Misconfigurations |
-Tuning j | Information disclosure |
-Tuning k | File upload |
-Tuning l | Local file inclusion |
-Tuning m | Remote file inclusion |
-Tuning n | Interesting files |
-Tuning o | OS command injection |
-Tuning p | Privilege escalation |
-Tuning q | Remote code execution |
-Tuning r | Remote file execution |
-Tuning s | SQL injection |
-Tuning t | Authentication bypass |
-Tuning u | Remote file retrieval |
-Tuning v | XSS |
-Tuning w | Information disclosure |
-Tuning x | XSS |
-Tuning y | XSS |
-Tuning z | XSS |
| Option | Description |
-useproxy <url> | Use HTTP proxy |
-ssl | Force SSL mode |
-nossl | Disable SSL checks |
-root | Prepend root value to all requests |
-timeout <seconds> | Request timeout (default 10) |
nikto -h example.com
nikto -h example.com -p 443 -ssl
nikto -h example.com -id admin:password
nikto -h example.com -Format htm -o report.html
nikto -h example.com -Tuning 8
nikto -h example.com -Tuning 3,4,8
nikto -h example.com -Display V -Display 1
nikto -h example.com -useproxy http://proxy.example.com:8080
nikto -h example.com -useragent "Mozilla/5.0"
nikto -h example.com -Cgidirs /cgi-bin/
nikto -h example.com -timeout 30
nikto -h example.com -p 80,443,8080
nikto -h example.com -mutate 2
nikto -h example.com -p 80,443 -ssl -Format htm -o report.html -Display V -Tuning 1,2,3,4,5,6,7,8,9