Hack5 Cloud C2 - Detect
ID: hack5-cloud-c2
Severity: info
Author: pussycat0x
Tags: c2,ir,osint,hack5c2,panel
Description
Section titled “Description”Cloud C² is a self-hosted web-based command and control suite for networked Hak5 gear that lets you pentest from anywhere. Linux, Mac and Windows computers can host the Cloud C² server while Hak5 gear such as the WiFi Pineapple, LAN Turtle and Packet Squirrel can be provisioned as clients.
YAML Source
Section titled “YAML Source”id: hack5-cloud-c2
info: name: Hack5 Cloud C2 - Detect author: pussycat0x severity: info description: | Cloud C² is a self-hosted web-based command and control suite for networked Hak5 gear that lets you pentest from anywhere. Linux, Mac and Windows computers can host the Cloud C² server while Hak5 gear such as the WiFi Pineapple, LAN Turtle and Packet Squirrel can be provisioned as clients. reference: - https://twitter.com/fofabot/status/1742737671037091854 metadata: verified: true max-request: 1 fofa-query: app="Hak5-C2" tags: c2,ir,osint,hack5c2,panel
http: - method: GET path: - '{{BaseURL}}'
matchers-condition: and matchers: - type: word part: body words: - '<title>Hak5 Cloud C²</title>'
- type: status status: - 200# digest: 490a0046304402206ed7aaae456136e0184500ddf9a1754a331b984a88799510b21a85064786985e02205ddb2de3add32e686605791fba128946c8125c6cf7794b736ae4644d52e9604e:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/exposed-panels/c2/hack5-cloud-c2.yaml"