Skip to content

Honeywell Scada Configuration File - Detect

ID: honeywell-scada-config

Severity: low

Author: alperenkesk

Tags: scada,config,exposure,edb

Honeywell Scada configuration file was detected. The downloaded file opens with the file name and contains critical information about the destination address.

id: honeywell-scada-config
info:
name: Honeywell Scada Configuration File - Detect
author: alperenkesk
severity: low
description: Honeywell Scada configuration file was detected. The downloaded file opens with the file name and contains critical information about the destination address.
reference:
- https://www.exploit-db.com/exploits/44734
metadata:
max-request: 1
tags: scada,config,exposure,edb
http:
- method: GET
path:
- "{{BaseURL}}/web_caps/webCapsConfig"
matchers-condition: and
matchers:
- type: word
words:
- "DeviceSubClass"
- "IPAddress"
condition: and
- type: status
status:
- 200
# digest: 4a0a004730450220654a6c02ba23b5e627826e99f805462a45ed2672641fd5ac381839dbd79615f6022100ed06fdded251a0f36a95baaba3b4ad8c39167e8061d3d31d44245d4eb4e7bb29:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposures/configs/honeywell-scada-config.yaml"

View on Github