nuclei-templates/http/technologies/adfs-detect.yaml

31 lines
789 B
YAML
Raw Normal View History

2021-11-12 16:59:49 +00:00
id: adfs-detect
info:
name: ADFS Detect
2024-06-21 08:28:43 +00:00
author: Adam Crosser,Mys7ic
2021-11-12 16:59:49 +00:00
severity: info
description: Detects ADFS with forms-based authentication enabled.
metadata:
max-request: 1
2023-10-14 11:27:55 +00:00
tags: tech,adfs
2021-11-12 16:59:49 +00:00
http:
2021-11-12 16:59:49 +00:00
- method: GET
path:
- "{{BaseURL}}/adfs/ls/idpinitiatedsignon.aspx"
matchers-condition: and
matchers:
- type: word
2021-11-12 20:09:02 +00:00
part: body
2021-11-12 16:59:49 +00:00
words:
- '/adfs/portal/css/style.css'
2024-06-21 09:06:32 +00:00
2024-06-21 08:28:43 +00:00
extractors:
- type: regex
part: body
name: domain
group: 1
regex:
- 'var\s+userNameValue\s*=\s*''([^\\]*)\\'
# digest: 4b0a00483046022100e9eb95794b5a4d8caa628cd3bf3a52b902b1958a250bfec5e6c7f9798e12262f022100db220f7c5b1b6eaabd6405c5292ade83f775623c355eeb6ea6001c44ed63243e:922c64590222798bb761d5b6d8e72950