nuclei-templates/http/technologies/detect-sentry.yaml

22 lines
445 B
YAML

id: detect-sentry
info:
name: Detect Sentry Instance
author: Sicksec
severity: info
reference:
- https://hackerone.com/reports/374737
- https://twitter.com/itsecurityguard/status/1127893545619218432?lang=en
tags: ssrf,sentry,tech,hackerone
http:
- method: GET
path:
- "{{BaseURL}}"
extractors:
- type: regex
part: body
regex:
- "https://[0-9a-f]*@[a-z0-9]+\\.[a-z.]+.?[0-9]+"