nuclei-templates/http/technologies/admiralcloud-detect.yaml

37 lines
956 B
YAML

id: admiralcloud-detect
info:
name: AdmiralCloud - Detect
author: righettod
severity: info
description: |
AdmiralCloud was detected.
reference:
- https://www.admiralcloud.com/en/
metadata:
verified: true
max-request: 1
shodan-query: http.title:"AdmiralCloud"
tags: tech,admiralcloud,detect
http:
- method: GET
path:
- "{{BaseURL}}"
redirects: true
max-redirects: 2
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains_any(to_lower(body), "content=\"admiralcloud", "<title>admiralcloud")'
condition: and
extractors:
- type: regex
part: body
group: 1
regex:
- '\s+([0-9\.]+)</title>'
# digest: 4b0a00483046022100fab5dc7f7572be380190e9cc477ecb451d14646f9d52f8b03fb92187ec9156bd022100c07a43ff46029e3f79c48fecc6760cba0e45b484ce9a6238ab9c58aa180992c9:922c64590222798bb761d5b6d8e72950