nuclei-templates/network/detection/rpcbind-portmapper-detect.yaml

34 lines
768 B
YAML
Raw Normal View History

2022-12-05 07:42:28 +00:00
id: rpcbind-portmapper-detect
info:
name: Rpcbind Portmapper - Detect
2022-12-05 07:42:28 +00:00
author: geeknik
severity: info
description: Rpcbind portmapper was detected.
2022-12-05 07:42:28 +00:00
reference: https://book.hacktricks.xyz/pentesting/pentesting-rpcbind
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0
cwe-id: CWE-200
2022-12-09 04:36:04 +00:00
metadata:
max-request: 2
2022-12-09 04:36:04 +00:00
verified: true
shodan-query: port:"111"
2022-12-05 07:42:28 +00:00
tags: network,rpcbind,portmap
tcp:
2022-12-05 07:42:28 +00:00
- inputs:
- data: 8000002836ed646d0000000000000002000186a0000000040000000400000000000000000000000000000000
type: hex
host:
- "{{Hostname}}"
- "{{Host}}:111"
matchers:
- type: word
words:
- "/run/rpcbind.sock"
# Enhanced by md on 2023/02/06