nuclei-templates/http/exposed-panels/skeepers-panel.yaml

38 lines
977 B
YAML
Raw Normal View History

2024-03-13 18:09:07 +00:00
id: skeepers-panel
info:
name: Skeepers Login Panel - Detect
author: righettod
severity: info
description: |
Skeepers login panel was detected.
reference:
- https://skeepers.io
metadata:
max-request: 2
shodan-query: http.title:"Skeepers"
verified: true
tags: panel,skeepers,login,detect
2024-03-13 18:09:07 +00:00
http:
- method: GET
path:
- "{{BaseURL}}/backend/login"
2024-03-13 18:19:03 +00:00
- "{{BaseURL}}"
stop-at-first-match: true
2024-03-13 18:09:07 +00:00
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains(to_lower(body), "skeepers") && contains(to_lower(body), "login")'
2024-03-13 18:19:03 +00:00
condition: and
2024-03-13 18:23:53 +00:00
2024-03-13 18:19:03 +00:00
extractors:
- type: regex
part: body
group: 1
regex:
- 'Version\s+([0-9\.]+)\s+-'
# digest: 4a0a00473045022055ca935a7e62bb0d9fab06340061125ec89924bc4a935aba4657014fe11bb0a902210098088c2f1ee6b99a0687cf825ec38295942c3940a76837925ffccb2309439413:922c64590222798bb761d5b6d8e72950