nuclei-templates/http/exposed-panels/regify-panel.yaml

43 lines
987 B
YAML
Raw Normal View History

2023-10-23 17:50:30 +00:00
id: regify-panel
info:
2023-10-25 17:27:28 +00:00
name: Regify Login Panel - Detect
2023-10-23 17:50:30 +00:00
author: righettod
severity: info
description: |
Regify Login Panel was detected.
reference:
- https://www.regify.com/
metadata:
verified: true
2023-10-23 17:50:30 +00:00
max-request: 1
2023-10-24 07:02:02 +00:00
shodan-query: http.favicon.hash:1817615343
2023-10-23 17:50:30 +00:00
tags: panel,regify,login,detect
http:
- method: GET
path:
- '{{BaseURL}}/phpLogin.php'
matchers-condition: and
matchers:
- type: word
part: body
words:
2023-10-23 18:00:28 +00:00
- 'regify'
- 'regibill'
2023-10-23 17:50:30 +00:00
- 'regify_default.css'
condition: and
case-insensitive: true
- type: status
status:
- 200
extractors:
- type: regex
part: body
group: 1
regex:
- '(?i)appv=([0-9.-]+)'
# digest: 490a0046304402206069994464971ee16e4224d6d4131aefac3b823a1b2bd62cc5a0f7a0790699be02207d1304b78c959f4aecfdcc5d3b577e151030fbc3b44c9dcf90625e525ebfa650:922c64590222798bb761d5b6d8e72950