nuclei-templates/network/detection/rpcbind-portmapper-detect.yaml

30 lines
918 B
YAML
Raw Normal View History

2022-12-05 07:42:28 +00:00
id: rpcbind-portmapper-detect
info:
name: Rpcbind Portmapper - Detect
2022-12-05 07:42:28 +00:00
author: geeknik
severity: info
description: Rpcbind portmapper was detected.
2022-12-05 07:42:28 +00:00
reference: https://book.hacktricks.xyz/pentesting/pentesting-rpcbind
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
2022-12-09 04:36:04 +00:00
metadata:
verified: true
max-request: 1
2022-12-09 04:36:04 +00:00
shodan-query: port:"111"
tags: network,rpcbind,portmap,detect,detection,tcp
tcp:
2022-12-05 07:42:28 +00:00
- inputs:
- data: 8000002836ed646d0000000000000002000186a0000000040000000400000000000000000000000000000000
type: hex
host:
- "{{Hostname}}"
2023-09-16 19:35:21 +00:00
port: 111
2022-12-05 07:42:28 +00:00
matchers:
- type: word
words:
- "/run/rpcbind.sock"
# digest: 490a0046304402201153ad9119a8e65877579776e8c514cfc7fcaa62aed594d44cc03a4dc444207e022029f8e87ecdde1a805addce5dc1e53dd9a2c4214a97675d82f4045bcc109812b0:922c64590222798bb761d5b6d8e72950