nuclei-templates/network/detection/openssh-detect.yaml

37 lines
891 B
YAML

id: openssh-detect
info:
name: OpenSSH Service - Detect
author: r3dg33k,daffainfo,iamthefrogy
severity: info
description: |
OpenSSH service was detected.
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0
cwe-id: CWE-200
reference:
- http://www.openwall.com/lists/oss-security/2016/08/01/2
- http://www.openwall.com/lists/oss-security/2018/08/15/5
- http://seclists.org/fulldisclosure/2016/Jul/51
- https://nvd.nist.gov/vuln/detail/CVE-2016-6210
- https://nvd.nist.gov/vuln/detail/CVE-2018-15473
tags: seclists,network,ssh,openssh,detect
metadata:
max-request: 2
tcp:
- host:
- "{{Hostname}}"
- "{{Host}}:22"
matchers:
- type: regex
regex:
- '(?i)OpenSSH'
extractors:
- type: regex
regex:
- '(?i)SSH-(.*)-OpenSSH_[^\r]+'