nuclei-templates/http/misconfiguration/sentinel-license-monitor.yaml

30 lines
768 B
YAML

id: sentinel-license-monitor
info:
name: Sentinel License Monitor - Detect
author: DhiyaneshDk
severity: unknown
metadata:
verified: true
max-request: 1
shodan-query: html:"Sentinel License Monitor"
tags: misconfig,sentinel,license,monitor
http:
- method: GET
path:
- "{{BaseURL}}/keyinfo.html"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "Sentinel License Monitor"
- "Licenses-in-use"
condition: and
- type: status
status:
- 200
# digest: 4b0a00483046022100801dfc952bec31796c7202016051fb5d6cd7a31d1582f6bab25138390ec5ef1d022100d474627bbaae6c5ee906b8b63f3a880515ad614c7e6ce992640bd563dc501a22:922c64590222798bb761d5b6d8e72950