nuclei-templates/ssl/c2/mythic-c2-ssl.yaml

32 lines
928 B
YAML

id: mythic-c2-ssl
info:
name: Mythic C2 SSL - Detect
author: johnk3r
severity: info
description: |
Mythic is a multiplayer, command and control platform for red teaming operations
reference: |
https://docs.mythic-c2.net
https://www.team-cymru.com/post/mythic-case-study-assessing-common-offensive-security-tools
metadata:
verified: "true"
max-request: 1
shodan-query: ssl:"Mythic"
censys-query: services.tls.certificates.leaf_data.issuer.common_name:Mythic
tags: c2,ir,osint,malware
ssl:
- address: "{{Host}}:{{Port}}"
matchers:
- type: word
part: issuer_dn
words:
- "O=Mythic"
extractors:
- type: json
json:
- " .issuer_dn"
# digest: 490a004630440220272dfad2d01196de865247a9a62d59cbfa9c1274854ff9ff78191f5ee4d26f1d02202a7c5d09dc93c913f1e82ccec442c3997a6ba399121f64b703325b53bfa7f86b:922c64590222798bb761d5b6d8e72950