nuclei-templates/http/misconfiguration/sentinel-license-monitor.yaml

30 lines
573 B
YAML

id: sentinel-license-monitor
info:
name: Sentinel License Monitor - Detect
author: DhiyaneshDk
severity: unknown
metadata:
verified: true
max-request: 1
shodan-query: html:"Sentinel License Monitor"
tags: misconfig,sentinel,license,monitor
http:
- method: GET
path:
- "{{BaseURL}}/keyinfo.html"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "Sentinel License Monitor"
- "Licenses-in-use"
condition: and
- type: status
status:
- 200