Files
nuclei-templates/file/bash/bash-scanner.yaml

48 lines
1.3 KiB
YAML
Raw Normal View History

id: bash-scanner
info:
2022-09-19 14:57:53 +05:30
name: Bash Scanner
author: ransomsec
severity: info
2022-09-19 14:57:53 +05:30
description: Indicator for bash Dangerous Commands You Should Never Execute on Linux
reference:
2022-09-19 14:57:53 +05:30
- https://www.tecmint.com/10-most-dangerous-commands-you-should-never-execute-on-linux/
- https://phoenixnap.com/kb/dangerous-linux-terminal-commands
2023-04-14 16:22:36 +02:00
tags: bash,file,shell,sh
2023-12-14 10:56:01 +07:00
file:
- extensions:
2022-09-19 14:57:53 +05:30
- sh
extractors:
- type: regex
name: fork-bomb
regex:
- ":(){:|:&};:"
- type: regex
name: rm command found
regex:
- "rm -(f|r)"
- "rm -(fr|rf)"
- type: regex
name: code injection
regex:
- "/bin/(sh|bash) -"
- "eval"
- "echo -c"
- "/bin/(sh|bash) -c"
- "(sh|bash) -"
- "(sh|bash) -c"
- type: regex
name: file manipulation
regex:
- "cat /dev/null >"
- type: regex
2022-09-19 14:57:53 +05:30
name: unknown filedownload
regex:
- '(wget|curl) (https?|ftp|file)://[-A-Za-z0-9\+&@#/%?=~_|!:,.;]*[-A-Za-z0-9\+&@#/%=~_|]\.[-A-Za-z0-9\+&@#/%?=~_|!:,.;]*[-A-Za-z0-9\+&@#/%=~_|]$'
2024-12-01 13:57:55 +00:00
# digest: 4a0a004730450221009d958257bd9ea7aa63ea47fb4e99dde8f10a3c9899c1d9b1af8ae2f2d914d8290220350c7869bfb9bf6e242475bda1bd3bae8410b28d2288c03e6b139552091123f5:922c64590222798bb761d5b6d8e72950