Files
nuclei-templates/http/technologies/detect-sentry.yaml
2025-10-26 16:17:37 +00:00

24 lines
679 B
YAML

id: detect-sentry
info:
name: Detect Sentry Instance
author: Sicksec
severity: info
reference:
- https://hackerone.com/reports/374737
- https://twitter.com/itsecurityguard/status/1127893545619218432?lang=en
metadata:
max-request: 1
tags: ssrf,sentry,tech,hackerone,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
extractors:
- type: regex
part: body
regex:
- "https://[0-9a-f]*@[a-z0-9]+\\.[a-z.]+.?[0-9]+"
# digest: 4a0a004730450221009246adacf730368349d1a7fb418dbeb9cf687891f18519725245f788c24b32a80220705244caf198084e59af062cab8e62513f3bac71309e03123e8b26725f38c6d0:922c64590222798bb761d5b6d8e72950