nuclei-templates/http/technologies/microsoft/microsoft-sharepoint-detect...

29 lines
731 B
YAML

id: microsoft-sharepoint-detect
info:
name: Microsoft SharePoint Detect
author: p-l-
severity: info
description: Check for SharePoint, using HTTP header MicrosoftSharePointTeamServices
metadata:
max-request: 1
tags: sharepoint,iis,microsoft,tech
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: regex
part: header
regex:
- "(?i)(Microsoftsharepointteamservices:)"
extractors:
- type: kval
kval:
- MicrosoftSharePointTeamServices
# digest: 4a0a0047304502205712d766a8536d99522d0d87b3cd0021438b73de335d41969c0a5205c0266ee0022100d0f4cb4a97a933b27be941e8799a4b87a89a321b56e797778bb5576ff8dfd325:922c64590222798bb761d5b6d8e72950