nuclei-templates/technologies/microsoft/microsoft-sharepoint-detect...

25 lines
509 B
YAML
Raw Normal View History

id: microsoft-sharepoint-detect
info:
name: Microsoft SharePoint Detect
author: p-l-
severity: info
description: Check for SharePoint, using HTTP header MicrosoftSharePointTeamServices
tags: sharepoint,iis,microsoft,tech
requests:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: regex
part: header
regex:
- "(?i)(Microsoftsharepointteamservices:)"
extractors:
- type: kval
kval:
- MicrosoftSharePointTeamServices