nuclei-templates/http/technologies/cisco-asa-detect.yaml

37 lines
790 B
YAML
Raw Normal View History

id: cisco-asa-detect
info:
name: Cisco ASA - Detect
author: sdcampbell
severity: info
metadata:
max-request: 1
tags: tech,cisco,detect
http:
- raw:
- |
GET / HTTP/1.1
Host: {{Hostname}}
X-Aggregate-Auth: 1
TESTME
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'config-auth client="vpn"'
- type: status
status:
- 200
extractors:
- type: regex
part: body
group: 1
regex:
- "<version who=\"sg\">(.*?)</version>"
# digest: 4a0a00473045022100bdd31733fde73c3a23176715aad39a8ce21dc953025f2db6b78fc589fa4b396602200ecfc3c19cb0c38bcf6038bebc60147a6b4b2c89808ab6c63f0210372472058c:922c64590222798bb761d5b6d8e72950