Skip to content

Brute Ratel C4 - Detect

ID: brute-ratel-c4

Severity: info

Author: pussycat0x

Tags: c2,bruteratel,c4,panel

Brute Ratel C4 (BRc4) is a legit red-teaming tool designed from the ground up with evasion capabilities in mind, but in the wrong hands can cause significant damage. Learn how to protect your organization with our Brute Ratel C4 Spotlight.

id: brute-ratel-c4
info:
name: Brute Ratel C4 - Detect
author: pussycat0x
severity: info
description: |
Brute Ratel C4 (BRc4) is a legit red-teaming tool designed from the ground up with evasion capabilities in mind, but in the wrong hands can cause significant damage. Learn how to protect your organization with our Brute Ratel C4 Spotlight.
reference:
- https://bruteratel.com/
metadata:
verified: "true"
max-request: 1
shodan-query: http.html_hash:-1957161625
tags: c2,bruteratel,c4,panel
http:
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: and
matchers:
- type: dsl
dsl:
- "contains(body, '404 file not found')"
- "(\"1a279f5df4103743b823ec2a6a08436fdf63fe30\" == sha1(body))"
condition: and
# digest: 490a004630440220113b3c9c6331f732c7ab996377556100e8b0556e276f222f724042fcf278738202207f209ddac76dd39263c897485a861e0e6424f6e19ec93190b1c0c4ea5d7ebcf1:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposed-panels/c2/brute-ratel-c4.yaml"

View on Github