Update CVE-2021-44228.yaml - Extract DNS interaction IP (#3396)
* Update CVE-2021-44228.yaml * lint fix Co-authored-by: sandeep <sandeep@projectdiscovery.io>patch-1
parent
cf5db1c2ad
commit
d2d47bfcb0
|
@ -53,6 +53,10 @@ requests:
|
||||||
- '([a-zA-Z0-9\.\-]+)\.([a-z0-9]+)\.([a-z0-9]+)\.([a-z0-9]+)\.\w+' # Print extracted ${hostName} in output
|
- '([a-zA-Z0-9\.\-]+)\.([a-z0-9]+)\.([a-z0-9]+)\.([a-z0-9]+)\.\w+' # Print extracted ${hostName} in output
|
||||||
|
|
||||||
extractors:
|
extractors:
|
||||||
|
- type: kval
|
||||||
|
kval:
|
||||||
|
- interactsh_ip # Print remote interaction IP in output
|
||||||
|
|
||||||
- type: regex
|
- type: regex
|
||||||
part: interactsh_request
|
part: interactsh_request
|
||||||
group: 2
|
group: 2
|
||||||
|
|
Loading…
Reference in New Issue