nuclei-templates/http/exposed-panels/seagate-nas-login.yaml

32 lines
736 B
YAML

id: seagate-nas-login
info:
name: Seagate NAS Login - Detect
author: JustaAcat
severity: info
description: |
Seagate NAS - SEAGATE Login was detected.
metadata:
verified: true
max-request: 1
shodan-query: title:"Seagate NAS - SEAGATE"
tags: panel,seagate,login
http:
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: and
matchers:
- type: word
words:
- Seagate NAS - SEAGATE
case-insensitive: true
- type: status
status:
- 200
# digest: 4a0a00473045022031c334c9747afcaca581cb3cc130b1ca6757729645f718676ab8d2cba28943570221008e9b66cafd85f3d24570d9c1bc811bc4b5669e0fae9e295f99c32beb1ccddeaf:922c64590222798bb761d5b6d8e72950