Skip to content

WireGuard Private Key

ID: wireguard-private-key

Severity: info

Author: DhiyaneshDK

Tags: wireguard,exposure,tokens

id: wireguard-private-key
info:
name: WireGuard Private Key
author: DhiyaneshDK
severity: info
reference:
- https://github.com/praetorian-inc/noseyparker/blob/main/crates/noseyparker/data/default/builtin/rules/wireguard.yml
- https://www.wireguard.com/quickstart/
- https://manpages.debian.org/testing/wireguard-tools/wg.8.en.html
- https://gist.github.com/lanceliao/5d2977f417f34dda0e3d63ac7e217fd
metadata:
verified: true
max-request: 1
tags: wireguard,exposure,tokens
http:
- method: GET
path:
- "{{BaseURL}}"
extractors:
- type: regex
part: body
regex:
- PrivateKey\s*=\s*([A-Za-z0-9+/]{43}=)
# digest: 4a0a0047304502210087a885ba62b124b4da89db58f029ad93a9199551942d9dc3a6336ec990d073df022068d80133646d19a96001b041c7646f4e3cd3d986d9a843cdbb588278e3ec2128:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposures/tokens/wireguard/wireguard-private-key.yaml"

View on Github