nuclei-templates/technologies/openssl-detect.yaml

34 lines
517 B
YAML

id: openssl-detect
info:
name: Openssl Detect
author: h4kux,princechaddha
severity: info
metadata:
verified: true
shodan-query: OpenSSL
tags: tech,openssl
requests:
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: and
matchers:
- type: word
part: server
words:
- "OpenSSL"
- type: status
status:
- 200
extractors:
- type: regex
part: header
regex:
- 'OpenSSL\/([0-9.a-z]+)'