nuclei-templates/http/exposed-panels/trellix-panel.yaml

36 lines
784 B
YAML

id: trellix-panel
info:
name: Trellix Login Panel
author: johnk3r
severity: info
description: |
Trellix login panel was detected.
metadata:
max-request: 1
shodan-query: "Server: Trellix"
verified: true
tags: trellix,panel,login
http:
- method: GET
path:
- "{{BaseURL}}/login/login"
matchers-condition: and
matchers:
- type: regex
part: header
regex:
- "Trellix"
- type: status
status:
- 200
extractors:
- type: kval
part: header
kval:
- Server
# digest: 4b0a00483046022100e75d706651228c9ab35c6063bad8ac906e6c0d663a7015161fd55e51e842f5aa022100df457dec552fd44de2211ed91a1df31c867f2f0c42d143ee00cdba05caa1ad30:922c64590222798bb761d5b6d8e72950