Files
nuclei-templates/network/detection/imap-detect.yaml
2024-12-01 13:57:55 +00:00

32 lines
765 B
YAML

id: imap-detect
info:
name: IMAP - Detect
author: pussycat0x
severity: info
description: |
IMAP was detected.
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
metadata:
verified: true
max-request: 1
shodan-query: imap
tags: network,detect,imap,mail,detection,tcp
tcp:
- inputs:
- data: "\n"
host:
- "{{Hostname}}"
port: 143
matchers-condition: and
matchers:
- type: word
words:
- "OK "
- "IMAP4rev1"
condition: and
# digest: 4b0a004830460221009358e3315efad38cb869838374d5e0714b6f316221f549037984fb27ba8a6631022100cf3be723fbcfb8a799531968ea5a607513cd44c09dbff79db6005c765a2f355b:922c64590222798bb761d5b6d8e72950