nuclei-templates/http/technologies/admiralcloud-detect.yaml

37 lines
954 B
YAML
Raw Normal View History

2024-03-10 17:12:56 +00:00
id: admiralcloud-detect
info:
name: AdmiralCloud - Detect
author: righettod
severity: info
description: |
AdmiralCloud was detected.
reference:
- https://www.admiralcloud.com/en/
metadata:
verified: true
max-request: 1
shodan-query: http.title:"AdmiralCloud"
tags: tech,admiralcloud,detect
2024-03-10 17:12:56 +00:00
http:
- method: GET
path:
- "{{BaseURL}}"
2024-03-11 06:54:23 +00:00
redirects: true
max-redirects: 2
2024-03-10 17:12:56 +00:00
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains_any(to_lower(body), "content=\"admiralcloud", "<title>admiralcloud")'
condition: and
extractors:
- type: regex
part: body
group: 1
regex:
2024-03-10 17:17:05 +00:00
- '\s+([0-9\.]+)</title>'
# digest: 4a0a0047304502205c24c35f90aca0e89179f01d1a237ccab6343919ce0c6355266172902ba1eba2022100c351db7b64945f148f96ff9d84d624e9b1807744b9d60db2938fc20453b2fddd:922c64590222798bb761d5b6d8e72950