Skip to content

NH C2 Server - Detect

ID: nh-c2

Severity: info

Author: pussycat0

Tags: tech,nh,c2,panel

id: nh-c2
info:
name: NH C2 Server - Detect
author: pussycat0
severity: info
reference:
- https://twitter.com/MichalKoczwara/status/1616179246216396806
metadata:
verified: "true"
max-request: 1
censys-query: 10baf5fcdde4563d3e145a1f553ae433fb1c3572
tags: tech,nh,c2,panel
http:
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: and
matchers:
- type: dsl
dsl:
- "status_code == 301 && status_code == 302"
- "(\"03609e8e4a0a0ef888327d64ae2dc8950664219e\" == sha1(body))"
condition: and
# digest: 4a0a00473045022100884f3d54c273d011284b6d6584fb95f8559ab1472885da1cf3b3f14c5a4dde9c02207c945c27b93d91e601f126888ee0c7c9bc543e67a1e60534054a70420bab2932:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposed-panels/c2/nh-c2.yaml"

View on Github