more tags
parent
b5120b0d16
commit
9cb97df4e9
|
@ -4,6 +4,7 @@ info:
|
|||
name: Apache ActiveMQ Default Credentials
|
||||
author: pd-team
|
||||
severity: medium
|
||||
tags: apache,activemq,dlogin
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -4,6 +4,7 @@ info:
|
|||
name: Apache Ambari Default Credentials
|
||||
author: pd-team
|
||||
severity: medium
|
||||
tags: ambari,dlogin
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -3,6 +3,7 @@ info:
|
|||
name: tomcat-manager-default-password
|
||||
author: pdteam
|
||||
severity: high
|
||||
tags: tomcat,apache,dlogin
|
||||
|
||||
requests:
|
||||
|
||||
|
|
|
@ -3,13 +3,15 @@ info:
|
|||
name: Grafana Default Credentials Check
|
||||
author: pdteam
|
||||
severity: high
|
||||
tags: grafana,dlogin
|
||||
|
||||
requests:
|
||||
# https://grafana.com/docs/grafana/latest/administration/configuration/#disable_brute_force_login_protection
|
||||
# https://github.com/grafana/grafana/issues/14755
|
||||
# Grafana blocks for 5 minutes after 5 "Invalid" attempts for valid user.
|
||||
# So make sure, not to attempt more than 4 password for same valid user.
|
||||
|
||||
requests:
|
||||
|
||||
- payloads:
|
||||
|
||||
# grafana_username:
|
||||
|
|
|
@ -4,6 +4,7 @@ info:
|
|||
name: Apache OfBiz Default Credentials
|
||||
author: pd-team
|
||||
severity: medium
|
||||
tags: ofbiz,dlogin
|
||||
|
||||
requests:
|
||||
- method: POST
|
||||
|
|
|
@ -4,6 +4,7 @@ info:
|
|||
name: RabbitMQ Default Credentials
|
||||
author: fyoorer & dwisiswant0
|
||||
severity: high
|
||||
tags: rabbitmq,dlogin
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
|
|
@ -4,6 +4,7 @@ info:
|
|||
name: SolarWinds Orion Default Credentials
|
||||
author: dwisiswant0
|
||||
severity: high
|
||||
tags: solarwinds,dlogin
|
||||
|
||||
# Optional:
|
||||
# POST /SolarWinds/InformationService/v3/Json/Create/Orion.Pollers HTTP/1.1
|
||||
|
|
|
@ -4,6 +4,7 @@ info:
|
|||
name: Zabbix Default Credentials
|
||||
author: pd-team
|
||||
severity: critical
|
||||
tags: zabbix,dlogin
|
||||
|
||||
requests:
|
||||
- method: POST
|
||||
|
|
|
@ -4,6 +4,7 @@ info:
|
|||
name: Azure takeover detection
|
||||
author: "pdnuclei - projectdiscovery.io"
|
||||
severity: high
|
||||
tags: dns,takeover
|
||||
|
||||
# Update the list with more CNAMEs related to azure
|
||||
# You need to claim the CNAME in Azure portal (https://portal.azure.com) to confirm the takeover.
|
||||
|
|
|
@ -4,6 +4,7 @@ info:
|
|||
name: 3rd party service checker
|
||||
author: pd-team
|
||||
severity: info
|
||||
tags: dns
|
||||
|
||||
dns:
|
||||
- name: "{{FQDN}}"
|
||||
|
|
|
@ -4,6 +4,7 @@ info:
|
|||
name: dead-host-with-cname
|
||||
author: pdnuclei - projectdiscovery.io
|
||||
severity: info
|
||||
tags: dns
|
||||
|
||||
dns:
|
||||
- name: "{{FQDN}}"
|
||||
|
|
|
@ -5,6 +5,7 @@ info:
|
|||
author: binaryfigments
|
||||
severity: info
|
||||
description: Check the email service or spamfilter that is used for a domain.
|
||||
tags: dns
|
||||
|
||||
dns:
|
||||
- name: "{{FQDN}}"
|
||||
|
|
|
@ -4,6 +4,7 @@ info:
|
|||
name: Servfail Host Finder
|
||||
author: pd-team
|
||||
severity: info
|
||||
tags: dns
|
||||
|
||||
dns:
|
||||
- name: "{{FQDN}}"
|
||||
|
|
|
@ -5,6 +5,7 @@ info:
|
|||
author: binaryfigments
|
||||
severity: info
|
||||
description: Check if TXT records in DNS for SPF records that have the PTR mechanism that is spoofable.
|
||||
tags: dns,spf
|
||||
|
||||
dns:
|
||||
- name: "{{FQDN}}"
|
||||
|
|
|
@ -4,6 +4,7 @@ info:
|
|||
name: Subdomain Takeover Detection
|
||||
author: "melbadry9 & pxmme1337 & geeknik"
|
||||
severity: high
|
||||
tags: takeover
|
||||
|
||||
# Update this list with new takeovers matchers
|
||||
# Do not delete other template files for takeover
|
||||
|
|
Loading…
Reference in New Issue