Files
nuclei-templates/network/detection/dotnet-remoting-service-detect.yaml
2024-12-01 13:57:55 +00:00

35 lines
927 B
YAML

id: dotnet-remoting-service-detect
info:
name: Microsoft .NET Remoting httpd - Detect
author: pussycat0x
severity: info
description: |
Microsoft .NET Remoting httpd was detected.
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
metadata:
verified: true
max-request: 1
shodan-query: product:"MS .NET Remoting httpd"
tags: network,detect,microsoft,dotnet,detection,tcp
tcp:
- inputs:
- data: "\n"
host:
- "{{Hostname}}"
port: 8080
matchers-condition: and
matchers:
- type: word
words:
- "Server: MS .NET Remoting"
extractors:
- type: regex
regex:
- ".NET CLR ([0-9.]+)"
# digest: 4a0a00473045022100e7794760628a798db2fcd71bd0a29a4db343b83311fc0a52cc830ed26911ce60022074c03aaf9e9eb894be3ed2b12f8b1f157dae83399c310bb6c06fd9af817f0969:922c64590222798bb761d5b6d8e72950