nuclei-templates/ssl/c2/mythic-c2-ssl.yaml

30 lines
735 B
YAML

id: mythic-c2-ssl
info:
name: Mythic C2 SSL - Detect
author: johnk3r
severity: info
description: |
Mythic is a multiplayer, command and control platform for red teaming operations
reference: |
https://docs.mythic-c2.net
https://www.team-cymru.com/post/mythic-case-study-assessing-common-offensive-security-tools
metadata:
verified: "true"
max-request: 1
shodan-query: ssl:"Mythic"
censys-query: services.tls.certificates.leaf_data.issuer.common_name:Mythic
tags: c2,ir,osint,malware
ssl:
- address: "{{Host}}:{{Port}}"
matchers:
- type: word
part: issuer_dn
words:
- "O=Mythic"
extractors:
- type: json
json:
- " .issuer_dn"