Skip to content

Seagate NAS Login - Detect

ID: seagate-nas-login

Severity: info

Author: JustaAcat

Tags: panel,seagate,login

Seagate NAS - SEAGATE Login was detected.

id: seagate-nas-login
info:
name: Seagate NAS Login - Detect
author: JustaAcat
severity: info
description: |
Seagate NAS - SEAGATE Login was detected.
classification:
cpe: cpe:2.3:o:seagate:nas_os:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: seagate
product: nas_os
shodan-query:
- title:"Seagate NAS - SEAGATE"
- http.title:"seagate nas - seagate"
fofa-query: title="seagate nas - seagate"
google-query: intitle:"seagate nas - seagate"
tags: panel,seagate,login
http:
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: and
matchers:
- type: word
words:
- Seagate NAS - SEAGATE
case-insensitive: true
- type: status
status:
- 200
# digest: 4b0a00483046022100ed57941f50bc121ece87ef4c000e248f09da8207521f43dc25296a6e2a934d4b022100839fdbe5f3544a4e94e21e077e1f783be23bae39e8fa5ad48c028aee3bffd8ad:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposed-panels/seagate-nas-login.yaml"

View on Github