nuclei-templates/technologies/kong-detect.yaml

26 lines
390 B
YAML
Raw Normal View History

id: kong-detect
info:
name: Detect Kong
author: geeknik
description: https://github.com/Kong/kong/
severity: info
requests:
- method: GET
path:
- "{{BaseURL}}/"
matchers-condition: and
matchers:
- type: regex
part: header
regex:
- kong+
extractors:
- type: kval
part: header
kval:
- Server