Files
nuclei-templates/network/detection/mysql-detect.yaml
2025-10-26 16:17:37 +00:00

31 lines
771 B
YAML

id: mysql-detect
info:
name: MySQL - Detect
author: pussycat0x
severity: info
description: |
MySQL instance was detected.
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
metadata:
verified: true
max-request: 1
shodan-query: product:"MySQL"
tags: network,mysql,db,detect,detection,tcp,discovery
tcp:
- inputs:
- data: "\n"
host:
- "{{Hostname}}"
port: 3306
matchers:
- type: word
part: body
words:
- "mysql"
case-insensitive: true
# digest: 490a0046304402205f9c57c7e2592ccbeb1786b39acdb8e46ea753b3c1d2e3de4d2901c2d9d2f44902202e3a9c2df7261c9a2ee8cc14dde952a108457f128b50d1c196dfe80b8a23a66a:922c64590222798bb761d5b6d8e72950