nuclei-templates/http/osint/phishing/1password-phish.yaml

35 lines
877 B
YAML

id: 1password-phish
info:
name: 1password phishing Detection
author: rxerium
severity: info
description: |
A 1password phishing website was detected
reference:
- https://1password.com
metadata:
max-request: 1
tags: phishing,1password,osint
http:
- method: GET
path:
- "{{BaseURL}}"
host-redirects: true
max-redirects: 2
matchers-condition: and
matchers:
- type: word
words:
- 'Password Manager for Families, Enterprise & Business | 1Password'
- type: status
status:
- 200
- type: dsl
dsl:
- '!contains(host,"1password.com")'
# digest: 4b0a00483046022100f5ef3f4fb8ca52516b7a478448322f50edc27c3743bf3541692ee9405dcdf471022100f30a019ee9b40ae526c7071e966cd7a3ab171db7675b8f6f6c80a2b9fc958468:922c64590222798bb761d5b6d8e72950