nuclei-templates/http/exposures/logs/darkstat-detect.yaml

44 lines
1.0 KiB
YAML
Raw Normal View History

2021-05-06 19:44:19 +00:00
id: darkstat-detect
info:
name: Detect Darkstat Reports
author: geeknik
severity: high
description: Darkstat captures network traffic, calculates statistics about usage, and serves reports over HTTP
reference:
- https://unix4lyfe.org/darkstat/
metadata:
max-request: 2
2023-10-14 11:27:55 +00:00
tags: darkstat,logs,exposure
2021-05-06 19:44:19 +00:00
http:
2021-05-06 19:44:19 +00:00
- method: GET
path:
- "{{BaseURL}}"
- "{{BaseURL}}/darkstat/"
2023-10-14 11:27:55 +00:00
2021-05-06 19:44:19 +00:00
# FYI, the default port for darkstat is 666
matchers-condition: and
matchers:
- type: regex
part: header
regex:
- "[Ss]erver: darkstat.*"
2023-10-14 11:27:55 +00:00
2021-05-06 19:44:19 +00:00
- type: word
part: body
words:
- "darkstat"
- "<title>Graphs"
- "Measuring for"
- "hosts</a>"
condition: and
2021-05-07 10:21:06 +00:00
2021-05-06 19:44:19 +00:00
extractors:
- type: kval
part: header
kval:
- server
# digest: 490a00463044022043dc3378018facc38ca1b0a3284a0d357da912f3fb9de6058ce4d7044d809c19022058bd852702d1684eeec06bb1fa7f100ac672e9414054ec519570c611f7329830:922c64590222798bb761d5b6d8e72950