nuclei-templates/technologies/fortinet-detect.yaml

24 lines
394 B
YAML

id: fortinet-detect
info:
name: Fortinet detected
author: pikpikcu,daffainfo
severity: info
tags: tech,jboss
requests:
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<title tiles:fragment="title">FORTINET LOGIN</title>'
- type: status
status:
- 200