Create spnego_http.yaml

patch-1
lady_bug 2023-01-11 11:36:56 +01:00
parent c19d6b1e1a
commit d11d3bb3bf
1 changed files with 30 additions and 0 deletions

View File

@ -0,0 +1,30 @@
id: SPNEGO_HTTP
info:
name: Identifying SPNEGO over HTTP (might be useful for finding CVE-2022-37958)
author: @lady_bug, @ruppde
severity: Info
reference:
- https://arstechnica.com/information-technology/2022/12/critical-windows-code-execution-vulnerability-went-undetected-until-now/?utm_social-type=owned&utm_source=twitter&utm_medium=social&utm_brand=ars
tags: misc,windows
requests:
- method: GET
path:
- "{{BaseURL}}"
redirects: true
max-redirects: 5
threads: 10
matchers-condition: and
matchers:
- type: dsl
dsl:
- "contains(tolower(all_headers), 'www-authenticate: negotiate')"
extractors:
- type: kval
kval:
- 'www_authenticate'