diff --git a/technologies/daybyday-detect.yaml b/exposed-panels/daybyday-panel.yaml
similarity index 64%
rename from technologies/daybyday-detect.yaml
rename to exposed-panels/daybyday-panel.yaml
index 15aa07c91a..979b9045ae 100644
--- a/technologies/daybyday-detect.yaml
+++ b/exposed-panels/daybyday-panel.yaml
@@ -1,10 +1,12 @@
-id: daybyday-detect
+id: daybyday-panel
info:
- name: DaybydayCRM Detect
- author: pikpikcu
+ name: DaybydayCRM Panel Login
+ author: pikpikcu,daffainfo
severity: info
- tags: tech,daybyday
+ metadata:
+ shodan-query: http.title:"Daybyday"
+ tags: panel,daybyday
requests:
- method: GET
diff --git a/exposed-panels/dolibarr-panel.yaml b/exposed-panels/dolibarr-panel.yaml
new file mode 100644
index 0000000000..1d502057cf
--- /dev/null
+++ b/exposed-panels/dolibarr-panel.yaml
@@ -0,0 +1,39 @@
+id: dolibarr-panel
+
+info:
+ name: Dolibarr Panel Login
+ author: pikpikcu,daffainfo
+ severity: info
+ metadata:
+ shodan-query: http.title:"Dolibarr"
+ tags: panel,dolibarr
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: header
+ words:
+ - 'Set-Cookie: DOLSESSID_'
+
+ - type: word
+ part: body
+ words:
+ - ''
+
+ - type: status
+ status:
+ - 200
+
+ extractors:
+ - type: regex
+ part: body
+ group: 1
+ regex:
+ - '
Dolibarr ([0-9.]+)<\/td>'
+ - ' | Dolibarr ([0-9.]+)<\/td>'
+ - ' Dolibarr ([0-9.]+)<\/div>'
diff --git a/exposed-panels/dotclear-panel.yaml b/exposed-panels/dotclear-panel.yaml
new file mode 100644
index 0000000000..8d9076985c
--- /dev/null
+++ b/exposed-panels/dotclear-panel.yaml
@@ -0,0 +1,27 @@
+id: dotclear-panel
+
+info:
+ name: Dotclear Panel Login
+ author: pikpikcu,daffainfo
+ severity: info
+ metadata:
+ shodan-query: http.title:"Dotclear"
+ tags: panel,dotclear
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/dc2/admin/auth.php"
+ - "{{BaseURL}}/auth.php"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - ''
+ - ' Dotclear'
+ condition: or
+
+ - type: status
+ status:
+ - 200
diff --git a/technologies/druid-detect.yaml b/exposed-panels/druid-panel.yaml
similarity index 74%
rename from technologies/druid-detect.yaml
rename to exposed-panels/druid-panel.yaml
index 63b0d5823e..5ac2fd1a81 100644
--- a/technologies/druid-detect.yaml
+++ b/exposed-panels/druid-panel.yaml
@@ -1,10 +1,10 @@
-id: druid-detect
+id: druid-panel
info:
- name: Druid monitor Detect
- author: pikpikcu
+ name: Druid monitor Panel Login
+ author: pikpikcu,daffainfo
severity: info
- tags: tech,druid
+ tags: panel,druid
requests:
- method: GET
@@ -13,7 +13,6 @@ requests:
matchers-condition: and
matchers:
-
- type: word
part: body
words:
diff --git a/technologies/ems-webclient-detect.yaml b/exposed-panels/ems-webclient-panel.yaml
similarity index 57%
rename from technologies/ems-webclient-detect.yaml
rename to exposed-panels/ems-webclient-panel.yaml
index 69f794d1c5..c4caaa5ec3 100644
--- a/technologies/ems-webclient-detect.yaml
+++ b/exposed-panels/ems-webclient-panel.yaml
@@ -1,27 +1,34 @@
-id: ems-webclient-detect
-
-info:
- name: EMS Web Client
- author: pussycat0x
- severity: info
- metadata:
- google-dork: inurl:EMSWebClient/
- tags: tech,ems
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/emswebclient/Login.aspx"
- - "{{BaseURL}}/Login.aspx"
-
- stop-at-first-match: true
- matchers-condition: and
- matchers:
-
- - type: word
- words:
- - "EMS Web Client - Login"
-
- - type: status
- status:
- - 200
\ No newline at end of file
+id: ems-webclient-panel
+
+info:
+ name: EMS Web Client Panel Login
+ author: pussycat0x,daffainfo
+ severity: info
+ metadata:
+ google-dork: inurl:EMSWebClient/
+ tags: panel,ems
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/emswebclient/Login.aspx"
+ - "{{BaseURL}}/Login.aspx"
+
+ stop-at-first-match: true
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "EMS Web Client - Login"
+
+ - type: status
+ status:
+ - 200
+
+ extractors:
+ - type: regex
+ part: body
+ group: 1
+ regex:
+ - 'Web Client Version (.*)'
\ No newline at end of file
diff --git a/technologies/fortinet-detect.yaml b/exposed-panels/fortinet-panel.yaml
similarity index 71%
rename from technologies/fortinet-detect.yaml
rename to exposed-panels/fortinet-panel.yaml
index ad26de136e..073036d9d8 100644
--- a/technologies/fortinet-detect.yaml
+++ b/exposed-panels/fortinet-panel.yaml
@@ -1,10 +1,12 @@
-id: fortinet-detect
+id: fortinet-panel
info:
- name: Fortinet detected
+ name: Fortinet Panel Login
author: pikpikcu,daffainfo
severity: info
- tags: tech,jboss
+ metadata:
+ shodan-query: http.title:"FORTINET LOGIN"
+ tags: panel,fotinet
requests:
- method: GET
diff --git a/exposed-panels/gespage-panel.yaml b/exposed-panels/gespage-panel.yaml
new file mode 100644
index 0000000000..2746f6df2d
--- /dev/null
+++ b/exposed-panels/gespage-panel.yaml
@@ -0,0 +1,34 @@
+id: gespage-panel
+
+info:
+ name: Gespage Panel Login
+ author: pikpikcu,daffainfo
+ severity: info
+ metadata:
+ shodan-query: "Path=/gespage"
+ tags: panel,gespage
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/gespage/webapp/login.xhtml"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - ''
+ - ''
+ condition: and
+
+ - type: status
+ status:
+ - 200
+
+ extractors:
+ - type: regex
+ part: body
+ group: 1
+ regex:
+ - '\(Ver: ([0-9._A-Z]+)\)'
diff --git a/technologies/glpi-cms-detect.yaml b/exposed-panels/glpi-panel.yaml
similarity index 56%
rename from technologies/glpi-cms-detect.yaml
rename to exposed-panels/glpi-panel.yaml
index 422e350661..e557297f14 100644
--- a/technologies/glpi-cms-detect.yaml
+++ b/exposed-panels/glpi-panel.yaml
@@ -1,10 +1,12 @@
-id: glpi-cms-detect
+id: glpi-panel
info:
- name: GLPI Cms Detection
- author: dogasantos
+ name: GLPI Panel Login
+ author: dogasantos,daffainfo
severity: info
- tags: glpi,cms,php
+ metadata:
+ shodan-query: http.title:"GLPI"
+ tags: panel,glpi
requests:
- method: GET
@@ -13,6 +15,7 @@ requests:
- "{{BaseURL}}/glpi/"
- "{{BaseURL}}/glpi2/"
+ stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
@@ -25,3 +28,10 @@ requests:
- type: status
status:
- 200
+
+ extractors:
+ - type: regex
+ part: body
+ group: 1
+ regex:
+ - 'base.min.js?v=(.*)'
\ No newline at end of file
diff --git a/exposed-panels/jaspersoft-panel.yaml b/exposed-panels/jaspersoft-panel.yaml
new file mode 100644
index 0000000000..e1afb10df0
--- /dev/null
+++ b/exposed-panels/jaspersoft-panel.yaml
@@ -0,0 +1,29 @@
+id: jaspersoft-panel
+
+info:
+ name: Jaspersoft Panel Login
+ author: koti2,daffainfo
+ severity: info
+ metadata:
+ shodan-query: http.title:"Jaspersoft"
+ tags: panel,jaspersoft
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/jasperserver/login.html?error=1"
+ - "{{BaseURL}}/jasperserver-pro/login.html?error=1"
+
+ stop-at-first-match: true
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - "TIBCO Jaspersoft: Login"
+ - "Could not login to JasperReports Server"
+ - "About TIBCO JasperReports Server"
+ condition: or
+
+ - type: status
+ status:
+ - 200
diff --git a/technologies/jeedom-detect.yaml b/exposed-panels/jeedom-panel.yaml
similarity index 58%
rename from technologies/jeedom-detect.yaml
rename to exposed-panels/jeedom-panel.yaml
index 4154e6b7d0..382c61003f 100644
--- a/technologies/jeedom-detect.yaml
+++ b/exposed-panels/jeedom-panel.yaml
@@ -1,10 +1,12 @@
-id: jeedom-detect
+id: jeedom-panel
info:
- name: Jeedom Detect
- author: pikpikcu
+ name: Jeedom Login Panel
+ author: pikpikcu,daffainfo
severity: info
- tags: tech,jeedom
+ metadata:
+ shodan-query: http.title:"Jeedom"
+ tags: panel,jeedom
requests:
- method: GET
@@ -13,11 +15,12 @@ requests:
matchers-condition: and
matchers:
-
- type: word
part: body
words:
- "Jeedom"
+ - "JEEDOM_PRODUCT_NAME"
+ condition: and
- type: status
status:
diff --git a/exposed-panels/kibana-panel.yaml b/exposed-panels/kibana-panel.yaml
new file mode 100644
index 0000000000..ad3530bfef
--- /dev/null
+++ b/exposed-panels/kibana-panel.yaml
@@ -0,0 +1,26 @@
+id: kibana-panel
+
+info:
+ name: Kibana Panel Login
+ author: petruknisme,daffainfo
+ severity: info
+ metadata:
+ shodan-query: http.title:"Kibana"
+ tags: panel,kibana
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/login"
+
+ matchers-condition: or
+ matchers:
+ - type: word
+ part: body
+ words:
+ - "Kibana"
+
+ - type: word
+ part: header
+ words:
+ - "Kbn-Name:"
diff --git a/technologies/landrayoa-detect.yaml b/exposed-panels/landrayoa-panel.yaml
similarity index 77%
rename from technologies/landrayoa-detect.yaml
rename to exposed-panels/landrayoa-panel.yaml
index 250f0654c9..105a663d34 100644
--- a/technologies/landrayoa-detect.yaml
+++ b/exposed-panels/landrayoa-panel.yaml
@@ -1,10 +1,10 @@
-id: landrayoa-detect
+id: landrayoa-panel
info:
- name: LandrayOA detect
+ name: LandrayOA Panel Login
author: YanYun
severity: info
- tags: tech,landrayoa
+ tags: panel,landrayoa
requests:
- method: GET
@@ -16,11 +16,14 @@ requests:
- type: status
status:
- 200
+
- type: word
+ part: body
words:
- 'lui_login_input_username'
- 'lui_login_input_password'
condition: and
+
- type: word
words:
- 'isopen='
diff --git a/exposed-panels/mautic-crm-panel.yaml b/exposed-panels/mautic-crm-panel.yaml
new file mode 100644
index 0000000000..d728240998
--- /dev/null
+++ b/exposed-panels/mautic-crm-panel.yaml
@@ -0,0 +1,27 @@
+id: mautic-crm-panel
+
+info:
+ name: Mautic CRM Panel Login
+ author: cyllective,daffainfo
+ severity: info
+ description: Mautic is a free and open-source marketing automation tool for Content Management, Social Media, Email Marketing, and can be used for the integration of social networks, campaign management, forms, questionnaires, reports, etc.
+ reference: https://github.com/mautic/mautic
+ tags: tech,mautic,crm
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/s/login"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - 'Mautic'
+ - 'var mauticBasePath'
+ condition: and
+
+ - type: status
+ status:
+ - 200
diff --git a/technologies/metabase-detect.yaml b/exposed-panels/metabase-panel.yaml
similarity index 80%
rename from technologies/metabase-detect.yaml
rename to exposed-panels/metabase-panel.yaml
index 3a865ab0e7..0834bf34c6 100644
--- a/technologies/metabase-detect.yaml
+++ b/exposed-panels/metabase-panel.yaml
@@ -1,11 +1,13 @@
-id: metabase-version-detect
+id: metabase-panel
info:
- name: Detect Metabase Version
- author: revblock
+ name: Metabase Login Panel
+ author: revblock,daffainfo
description: If a Metabase instance is deployed on the target URL it will return a login page with the version number in the page source
+ metadata:
+ shodan-query: http.title:"Metabase"
severity: info
- tags: tech,metabase
+ tags: panel,metabase
requests:
- method: GET
@@ -14,17 +16,16 @@ requests:
matchers-condition: and
matchers:
-
- type: status
status:
- 200
- type: word
+ part: body
words:
- "Metabase"
- "window.MetabaseBootstrap"
- "window.MetabaseRoot"
- part: body
condition: and
extractors:
diff --git a/exposed-panels/opencast-detect.yaml b/exposed-panels/opencast-detect.yaml
new file mode 100644
index 0000000000..081794ccb0
--- /dev/null
+++ b/exposed-panels/opencast-detect.yaml
@@ -0,0 +1,25 @@
+id: opencast-panel
+
+info:
+ name: Opencast Panel Login
+ author: cyllective,daffainfo
+ severity: info
+ description: The free and open source solution for automated video capture and distribution at scale.
+ reference: https://github.com/opencast/opencast
+ tags: panel,opencast
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}/admin-ng/login.html"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - 'Opencast'
+
+ - type: status
+ status:
+ - 200
diff --git a/technologies/clockwork-php-page.yaml b/exposures/logs/clockwork-php-page.yaml
similarity index 100%
rename from technologies/clockwork-php-page.yaml
rename to exposures/logs/clockwork-php-page.yaml
diff --git a/technologies/chevereto-detect.yaml b/technologies/chevereto-detect.yaml
index 070a428307..59ba07f6fa 100644
--- a/technologies/chevereto-detect.yaml
+++ b/technologies/chevereto-detect.yaml
@@ -4,12 +4,14 @@ info:
name: Chevereto detect
author: pikpikcu
severity: info
+ metadata:
+ shodan-query: http.title:"Centreon"
tags: tech,chevereto
requests:
- method: GET
path:
- - "{{BaseURL}}/login"
+ - "{{BaseURL}}"
matchers-condition: and
matchers:
@@ -18,6 +20,10 @@ requests:
regex:
- 'content="Chevereto(.*)">'
+ - type: status
+ status:
+ - 200
+
extractors:
- type: regex
part: body
diff --git a/technologies/craft-cms-detect.yaml b/technologies/craft-cms-detect.yaml
index ffd1e49a96..5c060a9d32 100644
--- a/technologies/craft-cms-detect.yaml
+++ b/technologies/craft-cms-detect.yaml
@@ -15,7 +15,6 @@ requests:
redirects: true
max-redirects: 2
-
matchers:
- type: word
part: header
diff --git a/technologies/crush-ftp-detect.yaml b/technologies/crush-ftp-detect.yaml
deleted file mode 100644
index ec9d334733..0000000000
--- a/technologies/crush-ftp-detect.yaml
+++ /dev/null
@@ -1,21 +0,0 @@
-id: crush-ftp-detect
-
-info:
- name: Crush FTP
- author: pussycat0x
- severity: info
- tags: tech,ftp
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/WebInterface/login.html"
-
- redirects: true
- matchers-condition: and
- matchers:
- - type: word
- words:
- - "CrushFTP WebInterface"
- - type: status
- status:
- - 200
\ No newline at end of file
diff --git a/technologies/lighttpd-default.yaml b/technologies/default-lighttpd-page.yaml
similarity index 100%
rename from technologies/lighttpd-default.yaml
rename to technologies/default-lighttpd-page.yaml
diff --git a/technologies/dolibarr-detect.yaml b/technologies/dolibarr-detect.yaml
deleted file mode 100644
index 77a8f82fdc..0000000000
--- a/technologies/dolibarr-detect.yaml
+++ /dev/null
@@ -1,25 +0,0 @@
-id: dolibarr-detect
-
-info:
- name: Dolibarr detect
- author: pikpikcu
- severity: info
- tags: tech,dolibarr
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}"
-
- matchers:
- - type: regex
- part: body
- regex:
- - 'Dolibarr - Login Dolibarr(.*)'
-
- extractors:
- - type: regex
- part: body
- group: 1
- regex:
- - 'center">(.*) | '
diff --git a/technologies/dotclear-detect.yaml b/technologies/dotclear-detect.yaml
deleted file mode 100644
index 7d622ff72a..0000000000
--- a/technologies/dotclear-detect.yaml
+++ /dev/null
@@ -1,22 +0,0 @@
-id: dotclear-detect
-
-info:
- name: Dotclear Detect
- author: pikpikcu
- severity: info
- tags: tech,dotclear
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/dc2/admin/auth.php"
- - "{{BaseURL}}/auth.php"
-
- matchers-condition: and
- matchers:
- - type: word
- words:
- - "Dotclear"
- - type: status
- status:
- - 200
diff --git a/technologies/fanruanoa-detect.yaml b/technologies/fanruanoa-detect.yaml
index 52ab6ec6ad..d78d5cd18b 100644
--- a/technologies/fanruanoa-detect.yaml
+++ b/technologies/fanruanoa-detect.yaml
@@ -13,6 +13,7 @@ requests:
- "{{BaseURL}}/WebReport/ReportServer"
- "{{BaseURL}}/ReportServer"
+ stop-at-first-match: true
matchers-condition: and
matchers:
- type: status
diff --git a/technologies/gespage-detect.yaml b/technologies/gespage-detect.yaml
deleted file mode 100644
index f64facbc02..0000000000
--- a/technologies/gespage-detect.yaml
+++ /dev/null
@@ -1,24 +0,0 @@
-id: gespage-detect
-
-info:
- name: Gespage Detect
- author: pikpikcu
- severity: info
- tags: tech,gespage
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/gespage/webapp/login.xhtml"
-
- matchers-condition: and
- matchers:
-
- - type: word
- part: body
- words:
- - "Login utilisateur Gespage"
-
- - type: status
- status:
- - 200
diff --git a/technologies/gilacms-detect.yaml b/technologies/gilacms-detect.yaml
index 335b1b291e..4718a54ca3 100644
--- a/technologies/gilacms-detect.yaml
+++ b/technologies/gilacms-detect.yaml
@@ -12,9 +12,9 @@ requests:
- "{{BaseURL}}"
- "{{BaseURL}}/user"
+ stop-at-first-match: true
matchers-condition: and
matchers:
-
- type: word
part: body
words:
diff --git a/technologies/graphiql-detect.yaml b/technologies/graphiql-detect.yaml
index e5dc4547a3..e78a5f94dd 100644
--- a/technologies/graphiql-detect.yaml
+++ b/technologies/graphiql-detect.yaml
@@ -12,8 +12,13 @@ requests:
path:
- "{{BaseURL}}"
+ matchers-condition: and
matchers:
- type: word
part: body
words:
- - 'GraphiQL'
\ No newline at end of file
+ - 'GraphiQL'
+
+ - type: status
+ status:
+ - 200
\ No newline at end of file
diff --git a/technologies/graylog-api-browser.yaml b/technologies/graylog-api-browser.yaml
index 98799a87c0..e2a056083f 100644
--- a/technologies/graylog-api-browser.yaml
+++ b/technologies/graylog-api-browser.yaml
@@ -10,6 +10,7 @@ requests:
- method: GET
path:
- "{{BaseURL}}/api/api-browser/"
+
matchers-condition: and
matchers:
- type: word
@@ -19,6 +20,7 @@ requests:
- "REST API browser"
- "swagger"
condition: and
+
- type: status
status:
- 200
diff --git a/technologies/gunicorn-detect.yaml b/technologies/gunicorn-detect.yaml
index 56f5080384..4ad26a0ab4 100644
--- a/technologies/gunicorn-detect.yaml
+++ b/technologies/gunicorn-detect.yaml
@@ -3,7 +3,8 @@ id: gunicorn-detect
info:
name: Detect Gunicorn Server
author: joanbono
- description: Gunicorn Python WSGI HTTP Server for UNIX - https://github.com/benoitc/gunicorn
+ description: Gunicorn Python WSGI HTTP Server for UNIX
+ reference: https://github.com/benoitc/gunicorn
severity: info
tags: tech,gunicorn
diff --git a/technologies/harbor-detect.yaml b/technologies/harbor-detect.yaml
index 1ede65a8df..d20e4657cf 100644
--- a/technologies/harbor-detect.yaml
+++ b/technologies/harbor-detect.yaml
@@ -9,7 +9,7 @@ info:
requests:
- method: GET
path:
- - '{{BaseURL}}/'
+ - '{{BaseURL}}'
matchers-condition: and
matchers:
diff --git a/technologies/home-assistant-detect.yaml b/technologies/home-assistant-detect.yaml
new file mode 100644
index 0000000000..593b211b99
--- /dev/null
+++ b/technologies/home-assistant-detect.yaml
@@ -0,0 +1,25 @@
+id: home-assistant-detect
+
+info:
+ name: Home Assistant Detect
+ author: fabaff,daffainfo
+ severity: info
+ metadata:
+ shodan-query: http.title:"Home Assistant"
+ tags: tech,iot
+
+requests:
+ - method: GET
+ path:
+ - "{{BaseURL}}"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - 'Home Assistant'
+
+ - type: status
+ status:
+ - 200
diff --git a/technologies/home-assistant.yaml b/technologies/home-assistant.yaml
deleted file mode 100644
index dfb82e44b7..0000000000
--- a/technologies/home-assistant.yaml
+++ /dev/null
@@ -1,16 +0,0 @@
-id: home-assistant
-
-info:
- name: Detect Home Assistant
- author: fabaff
- severity: info
- tags: tech,iot
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}"
- matchers:
- - type: word
- words:
- - "Home Assistant"
diff --git a/technologies/hp-blade-admin-detect.yaml b/technologies/hp-blade-admin-detect.yaml
index 14f3da8032..e36866e17f 100644
--- a/technologies/hp-blade-admin-detect.yaml
+++ b/technologies/hp-blade-admin-detect.yaml
@@ -4,7 +4,8 @@ info:
name: HP BladeSystem Onboard Administrator
author: pussycat0x
severity: info
- reference: https://www.shodan.io/search?query=http.title%3A%22HP+BladeSystem%22
+ metadata:
+ shodan-query: http.title:"HP BladeSystem"
tags: panel,hp
requests:
diff --git a/technologies/influxdb-detect.yaml b/technologies/influxdb-detect.yaml
index 7a9538b3aa..dc4cc49a71 100644
--- a/technologies/influxdb-detect.yaml
+++ b/technologies/influxdb-detect.yaml
@@ -4,6 +4,8 @@ info:
name: InfluxDB Detect
author: pikpikcu
severity: info
+ metadata:
+ shodan-query: http.title:"InfluxDB - Admin Interface"
tags: tech,influxdb
requests:
@@ -13,7 +15,6 @@ requests:
matchers-condition: and
matchers:
-
- type: word
part: body
words:
diff --git a/technologies/itop-detect.yaml b/technologies/itop-detect.yaml
deleted file mode 100644
index daf68e81e2..0000000000
--- a/technologies/itop-detect.yaml
+++ /dev/null
@@ -1,24 +0,0 @@
-id: itop-detect
-
-info:
- name: iTop Detect
- author: pikpikcu
- severity: info
- tags: tech,itop
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/pages/UI.php"
-
- matchers-condition: and
- matchers:
-
- - type: word
- part: body
- words:
- - "iTop login"
-
- - type: status
- status:
- - 200
diff --git a/technologies/jaspersoft-detect.yaml b/technologies/jaspersoft-detect.yaml
deleted file mode 100644
index e26ad12b3f..0000000000
--- a/technologies/jaspersoft-detect.yaml
+++ /dev/null
@@ -1,19 +0,0 @@
-id: jaspersoft-detect
-
-info:
- name: Jaspersoft detected
- author: koti2
- severity: info
- tags: tech,jaspersoft
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/jasperserver/login.html?error=1"
- matchers:
- - type: word
- words:
- - "TIBCO Jaspersoft: Login"
- - "Could not login to JasperReports Server"
- - "About TIBCO JasperReports Server"
- condition: or
diff --git a/technologies/jboss-detect.yaml b/technologies/jboss-detect.yaml
index ea29326cde..cbb93dd2b2 100644
--- a/technologies/jboss-detect.yaml
+++ b/technologies/jboss-detect.yaml
@@ -11,6 +11,7 @@ requests:
path:
- "{{BaseURL}}"
+ matchers-condition: and
matchers:
- type: word
part: body
@@ -19,3 +20,7 @@ requests:
- "Welcome to JBoss Application Server"
- "JBoss EAP 7"
condition: or
+
+ - type: status
+ status:
+ - 200
diff --git a/technologies/jenkins-detect.yaml b/technologies/jenkins-detect.yaml
index 4153223310..db5021ca32 100644
--- a/technologies/jenkins-detect.yaml
+++ b/technologies/jenkins-detect.yaml
@@ -2,7 +2,7 @@ id: jenkins-detect
info:
name: Jenkins detect (version)
- author: philippdelteil
+ author: philippdelteil,daffainfo
severity: info
tags: tech,jenkins
@@ -10,16 +10,19 @@ requests:
- method: GET
path:
- "{{BaseURL}}"
+
matchers-condition: and
matchers:
- type: word
words:
- "X-Jenkins"
+ - "X-Jenkins-Session"
part: header
+ condition: and
- type: word
words:
- - "Sign in [Jenkins]"
+ - "Dashboard [Jenkins]"
part: body
extractors:
diff --git a/technologies/jitsi-meet.yaml b/technologies/jitsi-meet-detect.yaml
similarity index 65%
rename from technologies/jitsi-meet.yaml
rename to technologies/jitsi-meet-detect.yaml
index 745a2c98e6..459d7da2ed 100644
--- a/technologies/jitsi-meet.yaml
+++ b/technologies/jitsi-meet-detect.yaml
@@ -1,11 +1,12 @@
-id: jitsi-meet
+id: jitsi-meet-detect
info:
- name: Jitsi Meet Page
+ name: Jitsi Meet Page Detect
author: dhiyaneshDK
severity: info
- reference: https://www.shodan.io/search?query=http.title%3A%22Jitsi+Meet%22
- tags: tech
+ metadata:
+ shodan-query: http.title:"Jitsi Meet"
+ tags: tech,jitsi
requests:
- method: GET
@@ -15,8 +16,10 @@ requests:
matchers-condition: and
matchers:
- type: word
+ part: body
words:
- "Jitsi Meet"
+
- type: status
status:
- 200
diff --git a/technologies/jolokia.yaml b/technologies/jolokia-detect.yaml
similarity index 95%
rename from technologies/jolokia.yaml
rename to technologies/jolokia-detect.yaml
index 957b898273..7c44fa8403 100644
--- a/technologies/jolokia.yaml
+++ b/technologies/jolokia-detect.yaml
@@ -1,4 +1,4 @@
-id: jolokia-instance
+id: jolokia-detect
info:
name: Jolokia Version Disclosure
diff --git a/technologies/kibana-detect.yaml b/technologies/kibana-detect.yaml
deleted file mode 100644
index c64939b6df..0000000000
--- a/technologies/kibana-detect.yaml
+++ /dev/null
@@ -1,24 +0,0 @@
-id: kibana-detect
-
-info:
- name: Kibana Service Detection
- author: petruknisme
- severity: info
- tags: tech,kibana
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/login?next=%2F"
- - "{{BaseURL}}/bundles/login.bundle.js"
- - "{{BaseURL}}/bundles/kibana.style.css"
-
- matchers:
- - type: word
- words:
- - "Kibana"
- - "kibanaLoaderWrap"
- - "kibanaLoader"
- - "xpack"
- - "Elasticsearch B.V"
- condition: or
\ No newline at end of file
diff --git a/technologies/kong-detect.yaml b/technologies/kong-detect.yaml
index 39e4d58bb7..aa380e4267 100644
--- a/technologies/kong-detect.yaml
+++ b/technologies/kong-detect.yaml
@@ -2,7 +2,8 @@ id: kong-detect
info:
name: Detect Kong
author: geeknik
- description: The Cloud-Native API Gateway - https://github.com/Kong/kong
+ description: The Cloud-Native API Gateway
+ reference: https://github.com/Kong/kong
severity: info
tags: tech,kong
diff --git a/technologies/linkerd-badrule-detect.yaml b/technologies/linkerd-detect.yaml
similarity index 100%
rename from technologies/linkerd-badrule-detect.yaml
rename to technologies/linkerd-detect.yaml
diff --git a/technologies/lucee-detect.yaml b/technologies/lucee-detect.yaml
index ae7e0c7860..0387d7f2ce 100644
--- a/technologies/lucee-detect.yaml
+++ b/technologies/lucee-detect.yaml
@@ -11,8 +11,8 @@ requests:
path:
- "{{BaseURL}}"
+ matchers-condition: and
matchers:
-
- type: regex
part: header
regex:
@@ -20,3 +20,7 @@ requests:
- "(?i)X-CB-Server: LUCEE"
- "(?i)X-IDG-Appserver: Lucee"
condition: or
+
+ - type: status
+ status:
+ - 200
diff --git a/technologies/mautic-crm-detect.yaml b/technologies/mautic-crm-detect.yaml
deleted file mode 100644
index 9d2f535e1d..0000000000
--- a/technologies/mautic-crm-detect.yaml
+++ /dev/null
@@ -1,31 +0,0 @@
-id: mautic-crm-detect
-
-info:
- name: mautic crm detect
- author: cyllective
- severity: info
- description: Detects Mautic CRM
- tags: tech,mautic,crm
- reference:
- - https://github.com/mautic/mautic
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/s/login"
-
- matchers-condition: or
- matchers:
- - type: word
- part: body
- condition: or
- words:
- - 'Mautic'
- - 'MoinMoin Powered'
- '
Python Powered'
+ - type: status
+ status:
+ - 200
+
extractors:
- type: regex
part: body
diff --git a/technologies/mrtg-detect.yaml b/technologies/mrtg-detect.yaml
index 96f95f15d6..c081f714b4 100644
--- a/technologies/mrtg-detect.yaml
+++ b/technologies/mrtg-detect.yaml
@@ -3,7 +3,8 @@ id: mrtg-detect
info:
name: Detect MRTG
author: geeknik
- description: The Multi Router Traffic Grapher -- https://oss.oetiker.ch/mrtg/
+ description: The Multi Router Traffic Grapher
+ reference: https://oss.oetiker.ch/mrtg/
severity: info
tags: tech,mrtg
@@ -14,6 +15,7 @@ requests:
- "{{BaseURL}}/mrtg/"
- "{{BaseURL}}/MRTG/"
+ stop-at-first-match: true
matchers-condition: and
matchers:
- type: status
diff --git a/technologies/nifi-detech.yaml b/technologies/nifi-detech.yaml
index 837e4c43fd..725823f16e 100644
--- a/technologies/nifi-detech.yaml
+++ b/technologies/nifi-detech.yaml
@@ -17,13 +17,16 @@ requests:
- "{{BaseURL}}/system-diagnostics"
- "{{BaseURL}}/nifi-api/access/config"
+ stop-at-first-match: true
matchers-condition: and
matchers:
- type: regex
+ part: body
regex:
- "supportsLogin"
- "disconnectedNodeAcknowledged"
- "(aggregate|node)Snapshots?"
+ condition: or
- type: status
status:
diff --git a/technologies/node-red-detect.yaml b/technologies/node-red-detect.yaml
index a0fd837d44..562f02c523 100644
--- a/technologies/node-red-detect.yaml
+++ b/technologies/node-red-detect.yaml
@@ -13,7 +13,6 @@ requests:
matchers-condition: and
matchers:
-
- type: word
part: body
words:
diff --git a/technologies/octobercms-detect.yaml b/technologies/octobercms-detect.yaml
index 1b5b221c6c..20db628a6b 100644
--- a/technologies/octobercms-detect.yaml
+++ b/technologies/octobercms-detect.yaml
@@ -14,6 +14,7 @@ requests:
- "{{BaseURL}}"
- "{{BaseURL}}/modules/system/assets/js/framework.combined-min.js"
+ stop-at-first-match: true
redirects: true
max-redirects: 1
matchers:
diff --git a/technologies/oidc-detect.yaml b/technologies/oidc-detect.yaml
index f87bf320d2..eade1914d6 100644
--- a/technologies/oidc-detect.yaml
+++ b/technologies/oidc-detect.yaml
@@ -11,6 +11,7 @@ requests:
- method: GET
path:
- "{{BaseURL}}/.well-known/openid-configuration"
+
matchers-condition: and
matchers:
- type: status
diff --git a/technologies/olivetti-crf-detect.yaml b/technologies/olivetti-crf-detect.yaml
index a54a16fb8e..7034c9514e 100644
--- a/technologies/olivetti-crf-detect.yaml
+++ b/technologies/olivetti-crf-detect.yaml
@@ -1,9 +1,11 @@
id: olivetti-crf-detect
+
info:
name: Olivetti CRF Detect
author: pussycat0x
severity: info
- reference: https://www.shodan.io/search?query=http.title%3A%22Olivetti+CRF%22
+ metadata:
+ shodan-query: http.title:"Olivetti CRF"
tags: tech,olivetti
requests:
diff --git a/technologies/oneblog-detect.yaml b/technologies/oneblog-detect.yaml
index 72fa47957b..f6ff236ad9 100644
--- a/technologies/oneblog-detect.yaml
+++ b/technologies/oneblog-detect.yaml
@@ -2,22 +2,23 @@ id: oneblog-detect
info:
name: OneBlog Detect
- author: pikpikcu
+ author: pikpikcu,daffainfo
severity: info
tags: tech,oneblog
requests:
- method: GET
path:
- - "{{BaseURL}}/passport/login/"
+ - "{{BaseURL}}"
matchers-condition: and
matchers:
-
- type: word
part: body
words:
- - "
OneBlog开源博客后台管理系统"
+ - '
OneBlog开源博客后台管理系统'
+ - '
Opencast'
diff --git a/technologies/openx-detect.yaml b/technologies/openx-detect.yaml
index 9d76d1fab6..b0a7dfcdfd 100644
--- a/technologies/openx-detect.yaml
+++ b/technologies/openx-detect.yaml
@@ -9,8 +9,10 @@ info:
requests:
- method: GET
path:
- - "{{BaseURL}}/www/admin/"
+ - "{{BaseURL}}/www/admin/index.php"
+ - "{{BaseURL}}/admin/index.php"
+ stop-at-first-match: true
matchers-condition: and
matchers:
- type: regex
@@ -27,4 +29,4 @@ requests:
part: body
group: 1
regex:
- - 'content="(.*)- http://www.openx.org">'
+ - '(.*)- http://www.openx.org'
diff --git a/technologies/wondercms-detect.yaml b/technologies/wondercms-detect.yaml
index b244d32945..3edc662811 100644
--- a/technologies/wondercms-detect.yaml
+++ b/technologies/wondercms-detect.yaml
@@ -13,7 +13,6 @@ requests:
matchers-condition: and
matchers:
-
- type: word
part: body
words:
diff --git a/technologies/wordpress-detect.yaml b/technologies/wordpress-detect.yaml
index e4d1e7aacc..8839d627ce 100644
--- a/technologies/wordpress-detect.yaml
+++ b/technologies/wordpress-detect.yaml
@@ -11,7 +11,7 @@ info:
requests:
- method: GET
path:
- - "{{RootURL}}"
+ - "{{BaseURL}}"
redirects: true
max-redirects: 2
diff --git a/technologies/wordpress-gotmls-detect.yaml b/technologies/wordpress-gotmls-detect.yaml
deleted file mode 100644
index f9fb7b85d9..0000000000
--- a/technologies/wordpress-gotmls-detect.yaml
+++ /dev/null
@@ -1,30 +0,0 @@
-id: wordpress-gotmls-detect
-
-info:
- name: Detect WordPress Plugin Anti-Malware Security and Bruteforce Firewall
- author: vsh00t
- reference: https://www.exploit-db.com/exploits/50107
- severity: info
- tags: wordpress,wp-plugin,gotmls
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/wp-admin/admin-ajax.php?action={{randstr}}&file=../../../../../../../../../Windows/win.ini"
-
- matchers-condition: and
- matchers:
- - type: word
- part: header
- words:
- - "gotmls"
-
- - type: status
- status:
- - 302
-
- extractors:
- - type: kval
- part: header
- kval:
- - location
diff --git a/technologies/linkerd-service-detect.yaml b/vulnerabilities/linkerd/linkerd-ssrf.yaml
similarity index 100%
rename from technologies/linkerd-service-detect.yaml
rename to vulnerabilities/linkerd/linkerd-ssrf.yaml