nuclei-templates/network/detection/imap-detect.yaml

32 lines
763 B
YAML

id: imap-detect
info:
name: IMAP - Detect
author: pussycat0x
severity: info
description: |
IMAP was detected.
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
metadata:
verified: true
max-request: 1
shodan-query: imap
tags: network,detect,imap,mail,detection,tcp
tcp:
- inputs:
- data: "\n"
host:
- "{{Hostname}}"
port: 143
matchers-condition: and
matchers:
- type: word
words:
- "OK "
- "IMAP4rev1"
condition: and
# digest: 4a0a00473045022100d718b35dd97858a072333115b63adca5e024121c3c91c7cb6fb76f1c7a807e71022035115fe2f8032199baac16e9da61afd0ef5637a7b5bafe49ab3126890ba09ed4:922c64590222798bb761d5b6d8e72950