Skip to content

vend takeover detection

ID: vend-takeover

Severity: high

Author: pdteam

Tags: takeover

vend takeover was detected.

id: vend-takeover
info:
name: vend takeover detection
author: pdteam
severity: high
description: vend takeover was detected.
reference:
- https://github.com/EdOverflow/can-i-take-over-xyz
metadata:
max-request: 1
tags: takeover
http:
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: and
matchers:
- type: dsl
dsl:
- Host != ip
- type: word
words:
- Looks like you've traveled too far into cyberspace.
extractors:
- type: dsl
dsl:
- cname
# digest: 4a0a004730450221008f2468521d0360201edf8e8faf6e36c91760e072244f8910e4eaaf5f11c7f8190220762a4a865a635bdfe5ed0525427f3b0d8fe1d7a20202a3f77e5f67d798a0e01c:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/takeovers/vend-takeover.yaml"

View on Github