nuclei-templates/file/bash/bash-scanner.yaml

49 lines
1.3 KiB
YAML
Raw Normal View History

id: bash-scanner
info:
2022-09-19 09:27:53 +00:00
name: Bash Scanner
author: ransomsec
severity: info
2022-09-19 09:27:53 +00:00
description: Indicator for bash Dangerous Commands You Should Never Execute on Linux
reference:
2022-09-19 09:27:53 +00:00
- https://www.tecmint.com/10-most-dangerous-commands-you-should-never-execute-on-linux/
- https://phoenixnap.com/kb/dangerous-linux-terminal-commands
2023-04-14 14:22:36 +00:00
tags: bash,file,shell,sh
file:
- extensions:
2022-09-19 09:27:53 +00:00
- sh
extractors:
- type: regex
name: fork-bomb
regex:
- ":(){:|:&};:"
- type: regex
name: rm command found
regex:
- "rm -(f|r)"
- "rm -(fr|rf)"
- type: regex
name: code injection
regex:
- "/bin/(sh|bash) -"
- "eval"
- "echo -c"
- "/bin/(sh|bash) -c"
- "(sh|bash) -"
- "(sh|bash) -c"
- type: regex
name: file manipulation
regex:
- "cat /dev/null >"
- type: regex
2022-09-19 09:27:53 +00:00
name: unknown filedownload
regex:
- '(wget|curl) (https?|ftp|file)://[-A-Za-z0-9\+&@#/%?=~_|!:,.;]*[-A-Za-z0-9\+&@#/%=~_|]\.[-A-Za-z0-9\+&@#/%?=~_|!:,.;]*[-A-Za-z0-9\+&@#/%=~_|]$'
# digest: 4a0a00473045022100db6e5f84fe8da8728aa4f05dd83a5d033d062fe552a148d3cf2fd599277d1eaf022040d4296bef6df6b57b8381af30fc75730d9bf8103ce7d37bdcfbe91317fc5344:922c64590222798bb761d5b6d8e72950