nuclei-templates/http/technologies/admiralcloud-detect.yaml

37 lines
953 B
YAML
Raw Normal View History

2024-03-10 17:12:56 +00:00
id: admiralcloud-detect
info:
name: AdmiralCloud - Detect
author: righettod
severity: info
description: |
AdmiralCloud was detected.
reference:
- https://www.admiralcloud.com/en/
metadata:
verified: true
max-request: 1
shodan-query: http.title:"AdmiralCloud"
tags: tech,admiralcloud,detect
2024-03-10 17:12:56 +00:00
http:
- method: GET
path:
- "{{BaseURL}}"
2024-03-11 06:54:23 +00:00
redirects: true
max-redirects: 2
2024-03-10 17:12:56 +00:00
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains_any(to_lower(body), "content=\"admiralcloud", "<title>admiralcloud")'
condition: and
extractors:
- type: regex
part: body
group: 1
regex:
2024-09-04 15:35:24 +00:00
- '\s+([0-9\.]+)</title>'
# digest: 4a0a004730450221008723f6d1a35c677250fcfdcae92154faf30a73277e94142eb3ca806414272d9602203d033356349acdef2e0bc3953c0d22cd93c9c4717ffe91fbb2d8245f64266efe:922c64590222798bb761d5b6d8e72950