nuclei-templates/http/misconfiguration/sentinel-license-monitor.yaml

35 lines
889 B
YAML

id: sentinel-license-monitor
info:
name: Sentinel License Monitor - Detect
author: DhiyaneshDk
severity: unknown
classification:
cpe: cpe:2.3:a:trioniclabs:sentinel:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: trioniclabs
product: sentinel
shodan-query: html:"Sentinel License Monitor"
tags: misconfig,sentinel,license,monitor
http:
- method: GET
path:
- "{{BaseURL}}/keyinfo.html"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "Sentinel License Monitor"
- "Licenses-in-use"
condition: and
- type: status
status:
- 200
# digest: 4b0a00483046022100801dfc952bec31796c7202016051fb5d6cd7a31d1582f6bab25138390ec5ef1d022100d474627bbaae6c5ee906b8b63f3a880515ad614c7e6ce992640bd563dc501a22:922c64590222798bb761d5b6d8e72950