Files
nuclei-templates/http/technologies/winrm-detect.yaml
2025-10-26 16:17:37 +00:00

37 lines
975 B
YAML

id: winrm-detect
info:
name: Windows Remote Management - Detection
author: pussycat0x
severity: info
description: |
Detects Windows Remote Management (WinRM) by checking HTTP response headers on ports 5985 (HTTP) and 5986 (HTTPS).
metadata:
max-request: 1
verified: true
shodan-query: product:"WinRM"
tags: network,winrm,windows,discovery
http:
- method: POST
path:
- "{{BaseURL}}/wsman"
matchers-condition: and
matchers:
- type: status
status:
- 401
- type: regex
part: header
regex:
- 'Microsoft-HTTPAPI\/[0-9\.]+'
- type: word
part: header
words:
- "Www-Authenticate: NTLM"
- "Www-Authenticate: Negotiate"
condition: or
# digest: 4a0a00473045022056692946082ce6e6d1e838106b03143dbb822f31b3c2114cc6a06775093abc140221008ac3d359d78e8e1c60dff6650ab7cbbb61ce372e63d8c11bd737fb4faf2d36d1:922c64590222798bb761d5b6d8e72950