Files
nuclei-templates/network/detection/dotnet-remoting-service-detect.yaml
2025-10-26 16:17:37 +00:00

35 lines
937 B
YAML

id: dotnet-remoting-service-detect
info:
name: Microsoft .NET Remoting httpd - Detect
author: pussycat0x
severity: info
description: |
Microsoft .NET Remoting httpd was detected.
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
metadata:
verified: true
max-request: 1
shodan-query: product:"MS .NET Remoting httpd"
tags: network,detect,microsoft,dotnet,detection,tcp,discovery
tcp:
- inputs:
- data: "\n"
host:
- "{{Hostname}}"
port: 8080
matchers-condition: and
matchers:
- type: word
words:
- "Server: MS .NET Remoting"
extractors:
- type: regex
regex:
- ".NET CLR ([0-9.]+)"
# digest: 4a0a00473045022065eb78b3ed57ddc99b2d6756f32c0c766bc82fd57e5a7ba257e5fa832645c893022100a15d3f21dcd24a51cad685194499beccdee4cbc06b2bae0fbbcb5b03f1d94e17:922c64590222798bb761d5b6d8e72950