nuclei-templates/network/detection/imap-detect.yaml

33 lines
748 B
YAML

id: imap-detect
info:
name: IMAP - Detect
author: pussycat0x
severity: info
description: |
IMAP was detected.
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
metadata:
max-request: 1
shodan-query: imap
verified: true
tags: network,detect,imap,mail
tcp:
- inputs:
- data: "\n"
host:
- "{{Hostname}}"
port: 143
matchers-condition: and
matchers:
- type: word
words:
- "OK "
- "IMAP4rev1"
condition: and
# digest: 490a0046304402200c8953f536fe7639dd9de632c7e2d08569fa5fac41af6bed372494f4fc9d11c7022014d27d65e4ed3ef40443b298560a40c514309b3631f7ccfe85a381e716f7dd67:922c64590222798bb761d5b6d8e72950