nuclei-templates/http/technologies/admiralcloud-detect.yaml

37 lines
775 B
YAML
Raw Normal View History

2024-03-10 17:12:56 +00:00
id: admiralcloud-detect
info:
2024-03-10 17:17:05 +00:00
name: AdmiralCloud - Detect
2024-03-10 17:12:56 +00:00
author: righettod
severity: info
description: |
AdmiralCloud was detected.
reference:
- https://www.admiralcloud.com/en/
metadata:
max-request: 1
verified: true
shodan-query: http.title:"AdmiralCloud"
2024-03-11 06:54:23 +00:00
tags: tech,admiralcloud,detect
2024-03-10 17:12:56 +00:00
http:
- method: GET
path:
- "{{BaseURL}}"
2024-03-11 06:54:23 +00:00
redirects: true
max-redirects: 2
2024-03-10 17:12:56 +00:00
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains_any(to_lower(body), "content=\"admiralcloud", "<title>admiralcloud")'
condition: and
extractors:
- type: regex
part: body
group: 1
regex:
2024-03-10 17:17:05 +00:00
- '\s+([0-9\.]+)</title>'