nuclei-templates/exposed-panels/ms-adcs-detect.yaml

29 lines
503 B
YAML
Raw Normal View History

id: ms-adcs-detect
info:
name: MS Active Directory Certificate Services Detector
author: divya_mudgal
severity: info
tags: microsoft,ad,panel
requests:
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: and
matchers:
- type: status
status:
- 302
- 301
condition: or
- type: dsl
dsl:
- "contains(tolower(all_headers), '/certsrv')"
extractors:
- type: kval
kval:
2021-11-13 09:04:13 +00:00
- location