nuclei-templates/network/detection/rpcbind-portmapper-detect.yaml

31 lines
909 B
YAML
Raw Normal View History

2022-12-05 07:42:28 +00:00
id: rpcbind-portmapper-detect
info:
name: Rpcbind Portmapper - Detect
2022-12-05 07:42:28 +00:00
author: geeknik
severity: info
description: Rpcbind portmapper was detected.
2022-12-05 07:42:28 +00:00
reference: https://book.hacktricks.xyz/pentesting/pentesting-rpcbind
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
2022-12-09 04:36:04 +00:00
metadata:
max-request: 1
2022-12-09 04:36:04 +00:00
shodan-query: port:"111"
verified: true
2023-07-24 18:27:05 +00:00
tags: network,rpcbind,portmap,detect
2022-12-05 07:42:28 +00:00
tcp:
2022-12-05 07:42:28 +00:00
- inputs:
- data: 8000002836ed646d0000000000000002000186a0000000040000000400000000000000000000000000000000
type: hex
host:
- "{{Hostname}}"
2023-09-16 19:35:21 +00:00
port: 111
2022-12-05 07:42:28 +00:00
matchers:
- type: word
words:
- "/run/rpcbind.sock"
# digest: 4b0a00483046022100d9265d34f5765ac8f6f4716a9aaccb2c566c6276019a306ab138208d0c971d8f022100eefe6b25c11f23f989f9b7f09450ad8b9a335b2bef4419ce3315f62746443c51:922c64590222798bb761d5b6d8e72950