nuclei-templates/http/osint/phishing/openai-phish.yaml

35 lines
837 B
YAML

id: openai-phish
info:
name: openai phishing Detection
author: rxerium
severity: info
description: |
A openai phishing website was detected
reference:
- https://openai.com
metadata:
max-request: 1
tags: phishing,openai,osint
http:
- method: GET
path:
- "{{BaseURL}}"
host-redirects: true
max-redirects: 2
matchers-condition: and
matchers:
- type: word
words:
- 'Log in to OpenAI to continue to OpenAI Platform.'
- type: status
status:
- 200
- type: dsl
dsl:
- '!contains(host,"openai.com")'
# digest: 4a0a00473045022100e7d3194ee6894c996476df596c34f855496271dbeac1580718bd26aad7a5170e02202c43b5b969a9afce00511ff79ccf4f84ad7943b8699f6694dc920c79e7e978e8:922c64590222798bb761d5b6d8e72950